Operational Information Requirement Analysis Based on Architecture Modeling

Size: px
Start display at page:

Download "Operational Information Requirement Analysis Based on Architecture Modeling"

Transcription

1 International Conferene on Mehatronis Control and Eletroni Engineering (MCE 2014) Analysis Based on Arhiteture Modeling Yinghui Yang Wei Ding and avigation Institute Air Fore Engineering University Shaanxi Xi an China Department of Training Air Fore Engineering University Shaanxi Xi an China Jianhua Li Mingli an and avigation Institute Air Fore Engineering University Shaanxi Xi an China Unit of the PLA Beiing China Abstrat information requirement analysis is the key of sorting out information alternation relationship and implementing effetive information flowing Aiming at the harateristis of operational systems arhiteture modeling theory is introdued and applied requirement elements of operational information nod ativity and phase are defined based on omplex network Four requirement mapping rules between nods and ativities thus Ativity Ativity and Ativity Ativity are defined and analyzed requirement models of nod hiberarhy ativity hiberarhy and information alternation are built and the speifi modeling flow is also given Finally aerial assault phase of aerial offensive ampaign (AOC) is taken as an example to validate the method s rationality and feasibility The results show that this method has provided a new idea and path for operational information requirement analysis And it is also helpful to enhane operational arhiteture researh s regulation and improve information requirement desription onsisteny Keywords-arhiteture modeling information requirement operational ativity mapping rule model ⅠITRODUCTIO Arhiteture modeling is a new operational requirement analysis theory developed in reent years and has been used suessfully in many military requirement analysis domains for its sientifi priniples lear proess and normative expression et [1] As the proetion of operational requirement in information domain operational information requirement is the demand and expetation of weapon equipment operational units and ommand & ontrol system for ombat with the harateristis of dynami entirety and tration et It plays ruial guiding and promoting roles in speeding up the supporting apaity building of ommand information system to researh operational information requirement In reent years sholars at home and abroad have made many useful explorations in operational information requirement analysis aspet The ahievements mainly entralize in requirement desription onepts analysis models and normative expression et For example literature [2] defines ommon onepts and terms of requirement desription and builds onept models in military requirement domain literature [3] puts forward a requirement analysis development proess and its model expression method based on UML for C4ISR system literature [4] builds a requirement information model and researh C4ISR system requirement integration method from syntax semantis and pragmatis 2014 The authors - Published by Atlantis Press But these ahievements mainly fous on the onepts and theory frame laking more refined models to support and ombination with operation reality Therefore in the following parts information requirement elements are defined requirement mapping rules are analyzed and requirement models are built aording to arhiteture modeling theory and method Finally aerial assault phase of aerial offensive ampaign (AOC) is taken as an example to validate the method s rationality and feasibility ⅡOPERATIOAL IFORMATIO REQUIREMET ELEMETS AD MAPPIG RULE As basi follow of sientifi requirement analysis arhiteture is an organi whole onsisting of units relationships and prinipia restriting evolution [5] information requirement arhiteture is omposed by information requirement elements and mapping rules requirement elements inlude operational phases ativities nods and information mapping rules inlude nod nod mapping nod ativity mapping ativity nod mapping and ativity ativity mapping A Element Operation implementation proess has typial networked mathemati struture harateristi in the bakground of network operations Therefore omplex network theory an be used to define the information requirement elements Definition 1: information is defined as the refletion of battlefield obets harateristi state and hange et during operation proess It an be divided into intelligene support information () operational ommand information () and weapon ontrol information () aording to information types Supposing that there are I0 kinds of operational information and the information an be divided into X0 levels in term of differene of operation view partile size Then operational information set an be noted as I Iiw i [1 X 0 ] [1 I 0 ] and the w is value of operation view partile size Definition 2: nod is defined as the substantiality produing gaining distributing and disposing operational information during operation proess It an be divided into intelligene support nods ommand & ontrol nods and fire striking nods aording to nod funtion Supposing that there are 0 kinds of operational nods and the nods an be divided into J0 levels in term of differene of operation view partile size Then operational nod set an be noted as in i [1 J 0 ] [1 0 ] and the n is value of operation view partile size Definition 3: ativity is defined as the set of ordered ations for operational nods to aomplish ertain speifi mission 166

2 Supposing that there are A 0 kinds of ativities and the ativities an be divided into H 0 levels in term of differene of operation view partile a A A i[1 H ] [1 A ] and size Then ativity set an be noted as i 0 0 the a is value of operation view partile size Definition 4: phase is defined as the set of ordered ations for operational nods to realize different operation purposes Supposing that there are S 0 kinds of operation phases and the phase set an be noted as S S i [1 S ] To any phase S i there always is Si Ak 1 Ak 2 Ak i and k [1 H0] [1 A0] B Rule 0 mapping rules are basi priniples of related mappings among information requirement elements during requirement analysis proess [6] Rule 1: nod requirement mapping is the mapping among operational nods It determines the information alternated between different nods The speifi rules are as follows: (1) Supposing the value of operation view partile size is (2) Selet operational information I the produing and onsuming nods are mp and m separately (3) Protrat information requirement line from mp to m orrespond it with I and (4) Aomplish the nod nod requirement mapping and note it as I i m p m Rule 2: Ativity ativity requirement mapping is the mapping from operational nods to ativities It determines the ativities nods partiipating in The speifi rules are as follows: (1) Supposing the value of operation view partile size is (2) Selet operational nod are Ah l Ah 2 Ah n set ativities it partiipating in respetively whih an be expressed uniformly by A h and noted as Ah Ah l Ah 2 Ah n (3) Connet with all the elements in A h orrespondingly (4) Aomplish the nod ativity requirement mapping of and note it as Ah l Ah m Ah n Rule 3: Ativity Ativity nod requirement mapping is the mapping from operational ativities to nods It determines nods pointed by movable frame mehanism arrows in operational ativity IDEF0 diagrams (a strutured analysis and design tehnology expressed by graphial language) and points out the nods involved in ertain ativities [7] The speifi rules are as follows: (1) Supposing the value of operation view partile size is (2) Selet operational ativity A nods springing it are t1 t2 t n respetively whih an be expressed uniformly by set tr and noted as t r t1 t2 t n (3) As the same priniple the ontrol nods set an be noted as tz and the output nods set is t (4) Put tr as input nods set of A IDEF0 diagram movable frame t and tz as ontrol and output nods set separately (5) Aomplish the ativity nod requirement mapping of A and note it as Ai t r t z t Rule 4: Ativity Ativity Ativity ativity requirement mapping is the mapping among operational ativities It determines the points of ativity IDEF0 diagram movable frame arrows and larifies operational information alternated among ativities [7 8] The speifi rules are as follows: (1) Supposing the value of operation view partile size is (2) Selet operational information I the produing and onsuming ativities are A np and A n separately (3) Put I as A np IDEF0 diagram movable frame output arrow s data restrition and I as input arrow (or ontrol arrow) s (4) Aomplish the ativity ativity requirement mapping and note it as A I i A n p n Ⅲ Model Aording to mapping rules above requirement models of nod hiberarhy ativity hiberarhy and information alternation are built respetively based on information requirement elements hierarhial strutures The speifi flow is as Fig1 shows [9] Hiberarhy Hiberarhy Model Clarify the Problem Ativity Ativity Alternation Model Ativity Ativity Ativity Model Figure 1 Basi modeling flow of requirement models Step 1: Deompose operational ativities and nods hierarhially aording to the differene of operation view partile size Step 2: Aording to nod nod requirement mapping rules operational information alternated among nods is determined nod nod requirement mapping and nod hiberarhy requirement model are built ombining nods hierarhial struture Step 3: Aording to ativity ativity requirement mapping rules operational information alternated among ativities is determined aording to nod ativity mapping rules operational ativities every nod partiipating in are determined aording to ativity nod requirement mapping rules operational nods every ativity involving are determined ativity ativity nod ativity ativity nod requirement mappings and ativity hiberarhy requirement model are built ombining nods and ativities hierarhial strutures Step 4: Combining operation implement proess information alternation requirement model is built based on the existing mappings Step 5: Aomplish operational information requirement analysis based on the three models built above A Model 1: Hiberarhy Model This model reflets the hierarhial information requirement orresponding relationship among nods and an be expressed as two elements funtion group onsisting of operational nods and information whih an be noted as M I [10] Supposing the value of operation view partile size is operational nods an be divided into levels and J0 nods and information sets are m [1 ] k [1 ] I I i[1 X ] [1 I ] separately mk 0 and i 0 0 when the value of operation view partile size is operational nods an be divided as levels and J0 nods and e[1 ] s[1 ] and information sets are es 0 I Igh g [1 X0] h [1 I0] separately as Fig2 shows α m1 Size isα I α 3 I α 1 1 I β I β g5 g6 β e1 Size isβ I β g1 I β g9 I α 2 α m2 I β g7 I β g8 β e5 I β g4 I β g3 α m3 β e4 β e2 I β g2 β e3 Figure 2 hiberarhy requirement model B Model 2: Model 167

3 This model reflets the hierarhial operational ativities and an be expressed as three elements funtion group onsisting of operational ativities information and nods whih an be noted as HM A I Supposing the value of operation view partile size is operational ativities an be divided into levels and H0 ativities information and ativities sets are A A n [1 ] t [1 A ] I I p[1 X ] q [1 I ] and nt 0 pq 0 0 fl [1 0] [1 0] f H l separately when the value of operation view partile size is operational ativities an be divided into levels and H0 ativities information and ativities sets are A Ab b[1 ] [1 A0] I Iwv w[1 X0] v [1 I0] and zx z[1 H0] x[1 0] separately as Fig3 shows Size isχ Size isδ I δ w2 I Χ p1 I Χ p2 A Χ n1 I Χ p3 A I Χ p4 A Χ n2 A δ b3 A δ b4 I Χ p5 I Χ p6 A Χ n3 Χ f1 Χ f2 Χ f3 Χ f4 Χ f5 I I δ δ w5 w4 I δ w1 A δ b1 A δ b2 I δ I δ w7 δ z1 w3 I δ w6 δ z2 δ z3 I δ w8 I δ w9 I δ w10 A δ b5 I δ w11 δ z8 I δ w12 A δ b6 I δ w13 δ z9 δ z10 δ z4 δ z5 δ z6 δ z7 Figure 3 Ativity hiberarhy requirement model C Model 3: Alternation Model This model reflets the information alternation relationship among nods and an be expressed as three elements funtion group onsisting of operational information ativities and nods whih an be noted as IM I A [4] Supposing the value of operation view partile size is selet operational information I the produing and onsuming nod sets are mp and m separately the produing and onsuming ativity sets are A and A m mp separately Then the information alternation requirement model an be noted I as i m p Am p m Am As the same priniple when the value ( ) of operation view partile size is this model an be noted A I A as m p m p m m ⅣEXAMPLE In the ondition of network operations take aerial assault phase of AOC as example information requirement an be analyzed referring to literature [7 10] Applying this method the information requirement analysis frame an be built as Fig4 shows Model Rule Element Figure 4 of Aerial Assault Phase Hiberarhy Model Ativity Ativity Alternation Model Ativity Model Ativity Ativity requirement analysis frame TCP RT A Aerial Assault Phase Analysis It is ruial phase for AOC that assaulting targets at land or sea from air It mainly inludes intelligene reonnaissane eletroni amming and assaulting tahes In intelligene reonnaissane tahe through applying multi- reonnaissane fore inluding radar eletroni warfare and tehnial reonnaissane synthetially aurate position shape harateristis quantity sale air defense and self-protetion ability of enemy important targets are reonnoitered foused These targets inlude air fore bases ombat airrafts air defense weapons espeially large-sale radars missile and antiairraft gun positions et In eletroni amming tahe enemy eletroni equipment is mainly suppressed ammed and deeived Important radar stations ommand & ontrol system eletromagnetism targets et are suffered anti-radiation attak These manoeuvers will form and keep a strong amming area As the result make enemy radars will be perplexed and the performane of ommand & ontrol system and anti-air weapon system redued In assaulting tahe main enemy targets and ruial parts are attaked entralized under region ommand post () s ommand and oordination espeially air defense system and aerial ounterattak operational system After first assaulting multi-reonnaissane methods suh as satellite aviation and ground reonnaissane are taken to find out assaulting effet and enemy troops deploy hange et Then ommand posts will modify their later assaulting targets and methods and selet some important targets destroyed in different extend as preferential ontinuous attak obets to destroyed drastially or suppressed hronially Aording to the ombat proess above operational ativities an be divided into intelligene reonnaissane ativity (IRA) eletroni onfronting ativity (EJA) and assaulting ativity (AA) nods an be divided into intelligene support nod (IS) inluding radar troop (RT) eletroni onfronting orps () intelligene enter () and warning satellite () ommand &ontrol nod (CC) inluding general ommand post (GCP) and region ommand post () and fire striking nod (FS) - aviation division () information an be divided into and B Hiberarhy Model Aording to the differene of operation view partile size an be divided hierarhially into division ommand post () warning & ommand raft () amming formation (JF) suppressing formation (SF) assaulting formation (AF) and overing formation (CF) RT an be divided hierarhially into troop ommand post (TCP) radar battalion (RB) a b and Aording to requirement mapping rule1(nod nod requirement mapping rule) twenty three FS interior mappings fourteen IS interior mappings two CC interior mappings and twenty one ross set mappings are built whih sums up to sixty nod nod mappings The speifi are as follows: GCP transfers to and transfers to GCP RT and and also transfers and to as well as RD and transfers to and transfers to GCP and transfers to RT and and also transfers to GCP and TCP transfers and to RB a b and RB a b and transfers to TCP transfers and to transfers to and also transfers and to JF SF AF and SF JF SF AF and SF transfers to Aording to the analysis above nod hiberarhy requirement model an be built as Fig5 shows GCP AF SF RBa RBb RB JF SF Figure 5 hiberarhy requirement model C Model an be divided hierarhially into warning deteting (WD) identifiation of friend (IFF) and information amalgamation (IA) Aording to the differene of operation view partile size IRA ECA an be divided hierarhially into eletroni reonnaissane 168

4 (ER) eletroni amming (EJ) and fire destroy (FD) Assaulting ativity (AA) an be divided hierarhially into standoff assaulting (SA) and preise assaulting (PA) Aording to requirement mapping rule4(ativity ativity requirement mapping rule) two IRA interior mappings two ECA interior mappings one AA interior mapping and three ross set mappings are built whih sums up to eight ativity ativity mappings[11] The speifi are as follows: IRA transfers to ECA and AA ECA transfers to AA WD transfers to IFF IFF transfers to IA ER transfers to EJ EJ transfers to FD SA transfers to PA Aording to requirement mapping rule2 and 3(nod ativity and ativity nod requirement mapping rules) sixteen nod ativity mappings and eleven ativity nod mapping are built whih sums up to twenty seven mappings The speifi are as follows: RT and implement IRA and implement ECA implements AA RB a b and implement WD RB a b and implement IFF implement IA JF and CF implement ER JF and CF implement EJ JF SF AF and CF implement FD JF SF AF and CF implement SA and PA Aording to the analysis above ativity hiberarhy requirement model an be built as Fig6 shows ER EJ FD JF CF JF CF JF SFAF CF Environment WD IFF IA Environment IRA ECA AA Environment SA PA RBa RBb RB RBa RBb RB Figure 6 D Alternation Model Aording to four requirement mappings and ombining aerial assault phase implement proess information alternation requirement Soure Target Produing Consuming Element Type Ativity Ativity GCP CCI IRA AA Command information GCP CCI ECA FD Command information GCP CCI IRA AA Command information CCI ECA AA RT Enemy's situation udgment plan Troops deploy RT CCI IRA AA Command information /RT/ / Ativity hiberarhy requirement model CCI IRA AA Command information IRA AA Command information CCI IRA AA Satellite ommand IRA AA Satellite ontrol CCI IRA AA Command information IRA AA Target ontrol ECA AA GCP/ IRA AA Self-intelligene Soure Soure JFSFAF CF JFSFAF CF model an be built as Fig7 shows [12] Target JF JF Target TCP RB Type Produing Consuming Element Ativity Ativity ERA PA CCI ERA PA ERA PA ERA PA ERA PA Enemy's situation udgment plan Control order CCI ERA PA Command order ERA PA Control order Type Produing Consuming Element Ativity Ativity Command order CCI WD IFF Target surveillane WD IFF Control order WD IFF Figure 7 alternation requirement model The requirement analysis struture and models built are helpful to larify requirement analysis idea subdivide analysis proess and stand out information requirement elements status and effet in requirement analysis proess It makes requirement expression more intuitionisti normative and lear and also validates the method s rationality and feasibility well ⅤCOCLUSIO It is inheritane and development of existing operational requirement analysis ahievements that analyzing information requirement based on arhiteture modeling theory In this paper information requirement elements are defined requirements mapping rules are researhed and requirements models are built A new method for information requirement analysis is provided whih is helpful to enhane requirement analysis riterion and onsisteny as well as requirement expression veraity Also it offers theory support and measure guarantee for researhing requirement analysis s normative pattern and developing supporting software platform ⅥACKOWLEDGMET Proet supported by the ational ature Siene Foundation of China (o ) *Corresponding author:yinghui Yang yangyinghuigood@163om REFERECE [1] DoD Arhiteture Framework Working Group DoD arhiteture RB 169 TCP Radar intelligene Radiant point parameter framework version 20 [R] US : Department of defense 2009 [2] Yu Bin Duan Cai-yu Rao De-hu A oneptual model for desribing C 4 ISR military requirements [J] Journal of ational University of Defense Tehnology (02): [3] Chen Hong-hu Fu Guang-sheng Rui Hong Researh of onordane development of C 4 ISR system requirements [J] Fire Control & Command Control (11): [4] Lv Xiang Luo Xue-shan Liu Jun-xian Researh on integration method of C 4 ISR system military requirements based on information model [J] Fire Control & Command Control (04):68-72 [5] Xie Wen-a Luo Xue-shan Luo Ai-min Meta-model based modeling of military information system arhiteture[j] Journal of ational University of Defense Tehnology (01):82-87 [6] Berry Daniel M s engineering: foundation for software quality[c]17th International Working Conferene on Engineering 2011 [7] Otto H Heukeroth Sam E Middlebrooks An investigation of ombat vehile ventilation requirements[r] US: Army Researh Laboratory 2011 [8] Duan Cai-yu Yu Bin Zhang Wei-ming Rao De-hu C 4 ISR requirements model and integrative desription [J] Journal of System Engineering (05): [9] Mihael GAlexander assurane: a verifiation proess[r] Langley Researh Center Hampton Virginia 2011 [10] Dhirendra Pandey Ugrasen Suman A K Ramani An approah to information requirement engineering [C] 2011 International Conferene on Siene and Appliations 2011 [11] Ian Sommerville Russell Lok Tim Storer et Deriving

5 information requirements from responsibility models [J] Leture otes in Computer Siene (1): [12] Hamed Farahani Manesh Dirk Shaefer requirements analysis for holoni manufaturing systems in a virtual environment [J] The International Journal of Advane Manufaturing Tehnology (1):

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera (IJCSIS) International Journal of Computer Siene and Information Seurity, Vol. 6, No. 3, 2009 The Appliation of Mamdani Fuzzy Model for Auto Funtion of a Digital Camera * I. Elamvazuthi, P. Vasant Universiti

More information

Modeling and analyzing interference signal in a complex electromagnetic environment

Modeling and analyzing interference signal in a complex electromagnetic environment Liu et al. EURASIP Journal on Wireless Communiations and Networking (016) 016:1 DOI 10.1186/s13638-015-0498-8 RESEARCH Modeling and analyzing interferene signal in a omplex eletromagneti environment Chun-tong

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date

More information

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs) 23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task Journal of Experimental Psyhology: Learning, Memory, and Cognition 2008, Vol. 34, No. 3, 712 718 Copyright 2008 by the Amerian Psyhologial Assoiation 0278-7393/08/$12.00 DOI: 10.1037/0278-7393.34.3.712

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition

More information

computer science Program Educational Objectives

computer science Program Educational Objectives omputer siene bahelor of siene minor ertifiates: managing information on the world wide web master of siene in omputer siene master of siene in software engineering advaned ertifiate programs: bioinformatis

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image

Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image Journal of Information & Computational Siene 11:3 (2014 817 824 February 10, 2014 Available at http://www.jois.om Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image Yinqi Xiong,

More information

A Design Environment for Migrating Relational to Object Oriented Database Systems

A Design Environment for Migrating Relational to Object Oriented Database Systems To appear in: 1996 International Conferene on Software Maintenane (ICSM 96); IEEE Computer Soiety, 1996 A Design Environment for Migrating Relational to Objet Oriented Database Systems Jens Jahnke, Wilhelm

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

i_~f e 1 then e 2 else e 3

i_~f e 1 then e 2 else e 3 A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

Availability, Reliability, Maintainability, and Capability

Availability, Reliability, Maintainability, and Capability Availability, Reliability, Maintainability, and Capability H. Paul Barringer, P.E. Barringer & Assoiates, In. Humble, TX Triplex Chapter Of The Vibrations Institute Hilton Hotel Beaumont, Texas February

More information

From a strategic view to an engineering view in a digital enterprise

From a strategic view to an engineering view in a digital enterprise Digital Enterprise Design & Management 2013 February 11-12, 2013 Paris From a strategi view to an engineering view in a digital enterprise The ase of a multi-ountry Telo Hervé Paault Orange Abstrat In

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking Customer Effiieny, Channel Usage and Firm Performane in Retail Banking Mei Xue Operations and Strategi Management Department The Wallae E. Carroll Shool of Management Boston College 350 Fulton Hall, 140

More information

THE UNIVERSITY OF TEXAS AT ARLINGTON COLLEGE OF NURSING. NURS 6390-004 Introduction to Genetics and Genomics SYLLABUS

THE UNIVERSITY OF TEXAS AT ARLINGTON COLLEGE OF NURSING. NURS 6390-004 Introduction to Genetics and Genomics SYLLABUS THE UNIVERSITY OF TEXAS AT ARLINGTON COLLEGE OF NURSING NURS 6390-004 Introdution to Genetis and Genomis SYLLABUS Summer Interession 2011 Classroom #: TBA and 119 (lab) The University of Texas at Arlington

More information

Discovering Trends in Large Datasets Using Neural Networks

Discovering Trends in Large Datasets Using Neural Networks Disovering Trends in Large Datasets Using Neural Networks Khosrow Kaikhah, Ph.D. and Sandesh Doddameti Department of Computer Siene Texas State University San Maros, Texas 78666 Abstrat. A novel knowledge

More information

AUTOMATED VISUAL TRAFFIC MONITORING AND SURVEILLANCE THROUGH A NETWORK OF DISTRIBUTED UNITS

AUTOMATED VISUAL TRAFFIC MONITORING AND SURVEILLANCE THROUGH A NETWORK OF DISTRIBUTED UNITS AUTOMATED VISUAL TRAFFIC MOITORIG AD SURVEILLACE THROUGH A ETWORK OF DISTRIBUTED UITS A. Koutsia a, T. Semertzidis a, K. Dimitropoulos a,. Grammalidis a and K. Georgouleas b a Informatis and Telematis

More information

Context in Artificial Intelligent and Information Modeling

Context in Artificial Intelligent and Information Modeling Context in Artifiial Intelligent and Information Modeling Manos Theodorakis ½ and Niolas Spyratos ¾ ¾ ½ FIT-Fraunhofer Institute for Applied Information Tehnology, D-53754, Sankt Augustin, Germany manos.theodorakis@fit.fraunhofer.de

More information

GABOR AND WEBER LOCAL DESCRIPTORS PERFORMANCE IN MULTISPECTRAL EARTH OBSERVATION IMAGE DATA ANALYSIS

GABOR AND WEBER LOCAL DESCRIPTORS PERFORMANCE IN MULTISPECTRAL EARTH OBSERVATION IMAGE DATA ANALYSIS HENRI COANDA AIR FORCE ACADEMY ROMANIA INTERNATIONAL CONFERENCE of SCIENTIFIC PAPER AFASES 015 Brasov, 8-30 May 015 GENERAL M.R. STEFANIK ARMED FORCES ACADEMY SLOVAK REPUBLIC GABOR AND WEBER LOCAL DESCRIPTORS

More information

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

Robust Classification and Tracking of Vehicles in Traffic Video Streams

Robust Classification and Tracking of Vehicles in Traffic Video Streams Proeedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conferene Toronto, Canada, September 17-20, 2006 TC1.4 Robust Classifiation and Traking of Vehiles in Traffi Video Streams

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

Measurement of Powder Flow Properties that relate to Gravity Flow Behaviour through Industrial Processing Lines

Measurement of Powder Flow Properties that relate to Gravity Flow Behaviour through Industrial Processing Lines Measurement of Powder Flow Properties that relate to Gravity Flow ehaviour through Industrial Proessing Lines A typial industrial powder proessing line will inlude several storage vessels (e.g. bins, bunkers,

More information

A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD

A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD Ghada F.Elkaany,

More information

Picture This: Molecular Maya Puts Life in Life Science Animations

Picture This: Molecular Maya Puts Life in Life Science Animations Piture This: Moleular Maya Puts Life in Life Siene Animations [ Data Visualization ] Based on the Autodesk platform, Digizyme plug-in proves aestheti and eduational effetiveness. BY KEVIN DAVIES In 2010,

More information

SOFTWARE ENGINEERING I

SOFTWARE ENGINEERING I SOFTWARE ENGINEERING I CS 10 Catalog Desription PREREQUISITE: CS 21. Introdution to the systems development life yle, software development models, analysis and design tehniques and tools, and validation

More information

Dataflow Features in Computer Networks

Dataflow Features in Computer Networks Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis Gyula Max Budapest University of Tehnology and Eonomis, Department

More information

THE EFFECT OF WATER VAPOR ON COUNTERFLOW DIFFUSION FLAMES

THE EFFECT OF WATER VAPOR ON COUNTERFLOW DIFFUSION FLAMES THE EFFECT OF WATER VAPOR ON COUNTERFLOW DIFFUSION FLAMES by Jaeil Suh and Arvind Atreya Combustion and Heat Tkansfer Laboratory Department of Mehanial Engineering and Applied Mehanis The University of

More information

Green Cloud Computing

Green Cloud Computing International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

Software Ecosystems: From Software Product Management to Software Platform Management

Software Ecosystems: From Software Product Management to Software Platform Management Software Eosystems: From Software Produt Management to Software Platform Management Slinger Jansen, Stef Peeters, and Sjaak Brinkkemper Department of Information and Computing Sienes Utreht University,

More information

Pattern Recognition Techniques in Microarray Data Analysis

Pattern Recognition Techniques in Microarray Data Analysis Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA faramarz@sienes.sdsu.edu

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information

Recovering Articulated Motion with a Hierarchical Factorization Method

Recovering Articulated Motion with a Hierarchical Factorization Method Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu

More information

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities File:UserVisfit_2.do User s Guide VISFIT: a omputer tool for the measurement of intrinsi visosities Version 2.a, September 2003 From: Multiple Linear Least-Squares Fits with a Common Interept: Determination

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

Big Data Analysis and Reporting with Decision Tree Induction

Big Data Analysis and Reporting with Decision Tree Induction Big Data Analysis and Reporting with Deision Tree Indution PETRA PERNER Institute of Computer Vision and Applied Computer Sienes, IBaI Postbox 30 11 14, 04251 Leipzig GERMANY pperner@ibai-institut.de,

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

) ( )( ) ( ) ( )( ) ( ) ( ) (1) OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples

More information

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,

More information

Recent Progress in Brillouin Scattering Based Fiber Sensors

Recent Progress in Brillouin Scattering Based Fiber Sensors Sensors 011, 11, 415-4187; doi:10.3390/s11040415 OPEN ACCESS sensors ISSN 144-80 www.mdpi.om/journal/sensors Review Reent Progress in rillouin Sattering ased Fiber Sensors Xiaoyi ao * and Liang Chen Physis

More information

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings Computational Analysis of Two Arrangements of a Central Ground-Soure Heat Pump System for Residential Buildings Abstrat Ehab Foda, Ala Hasan, Kai Sirén Helsinki University of Tehnology, HVAC Tehnology,

More information

Agile ALM White Paper: Redefining ALM with Five Key Practices

Agile ALM White Paper: Redefining ALM with Five Key Practices Agile ALM White Paper: Redefining ALM with Five Key Praties by Ethan Teng, Cyndi Mithell and Chad Wathington 2011 ThoughtWorks ln. All rights reserved www.studios.thoughtworks.om Introdution The pervasiveness

More information

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit

More information

THERMAL TO MECHANICAL ENERGY CONVERSION: ENGINES AND REQUIREMENTS Vol. I - Thermodynamic Cycles of Reciprocating and Rotary Engines - R.S.

THERMAL TO MECHANICAL ENERGY CONVERSION: ENGINES AND REQUIREMENTS Vol. I - Thermodynamic Cycles of Reciprocating and Rotary Engines - R.S. THERMAL TO MECHANICAL ENERGY CONVERSION: ENGINES AND REQUIREMENTS Vol. I - Thermodynami Cyles of Reiproating and Rotary Engines - R.S.Kavtaradze THERMODYNAMIC CYCLES OF RECIPROCATING AND ROTARY ENGINES

More information

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes 1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes

More information

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7 Export Finane Program Guidelines Table of Contents Setion I General...........................................................1 A. Introdution............................................................1

More information

Interactive Feature Specification for Focus+Context Visualization of Complex Simulation Data

Interactive Feature Specification for Focus+Context Visualization of Complex Simulation Data Joint EUROGRAPHICS - IEEE TCVG Symposium on Visualization (2003) G.-P. Bonneau, S. Hahmann, C. D. Hansen (Editors) Interative Feature Speifiation for Fous+Context Visualization of Complex Simulation Data

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Implementation of PIC Based LED Displays

Implementation of PIC Based LED Displays International Journal of Eletronis and Computer Siene Engineering Available Online at www.ijese.org ISSN- - Implementation of PIC Based LED Displays Htet Htet Thit San, Chaw Myat Nwe and Hla Myo Tun Department

More information

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling Agent-Based Grid Load Balaning Using Performane-Driven Task Sheduling Junwei Cao *1, Daniel P. Spooner, Stephen A. Jarvis, Subhash Saini and Graham R. Nudd * C&C Researh Laboratories, NEC Europe Ltd.,

More information

protection p1ann1ng report

protection p1ann1ng report f1re~~ protetion p1ann1ng report BUILDING CONSTRUCTION INFORMATION FROM THE CONCRETE AND MASONRY INDUSTRIES Signifiane of Fire Ratings for Building Constrution NO. 3 OF A SERIES The use of fire-resistive

More information

Chapter 5 Single Phase Systems

Chapter 5 Single Phase Systems Chapter 5 Single Phase Systems Chemial engineering alulations rely heavily on the availability of physial properties of materials. There are three ommon methods used to find these properties. These inlude

More information

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms Interpretable Fuzzy Modeling using Multi-Objetive Immune- Inspired Optimization Algorithms Jun Chen, Mahdi Mahfouf Abstrat In this paper, an immune inspired multi-objetive fuzzy modeling (IMOFM) mehanism

More information

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate Prie-based versus -based approahes for stimulating the development of renewable eletriity: new insights in an old debate uthors: Dominique FINON, Philippe MENNTEU, Marie-Laure LMY, Institut d Eonomie et

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

Interaction-Driven Virtual Reality Application Design

Interaction-Driven Virtual Reality Application Design Nar s Parés npares@iua.upf.es Ro Parés rpares@iua.upf.es Audiovisual Institute, Universitat Pompeu Fabra, Pg. Cirumval. laió, 8 08003 Barelona, Spain www.iua.upf.es/, gvirtual Interation-Driven Virtual

More information

STRATEGIC DESIGN FOR THE SUPPLY NETWORK OF MULTI-SITE ENTERPRISES: A MATHEMATICAL MODEL AND SOLVING APPROACHES

STRATEGIC DESIGN FOR THE SUPPLY NETWORK OF MULTI-SITE ENTERPRISES: A MATHEMATICAL MODEL AND SOLVING APPROACHES STRATEGIC DESIGN FOR THE SUPPLY NETWORK OF MULTI-SITE ENTERPRISES: A MATHEMATICAL MODEL AND SOLVING APPROACHES Florene Pirard 1, Fouad Riane 2, Serguei Iassinovski 2, Valérie Botta-Genoulaz 1 1 Laboratoire

More information

Bandwidth Allocation and Session Scheduling using SIP

Bandwidth Allocation and Session Scheduling using SIP JOURAL OF COUICAIS, VOL., O. 5, AUGUS 006 7 Bandwidth Alloation and Session Sheduling using SIP Hassan HASSA, Jean-arie GARCIA and Olivier BRU LAAS-CRS, oulouse, Frane Email: {hhassan}@laas.fr Abstrat

More information

Method for characterizing single photon detectors in saturation regime by cw laser

Method for characterizing single photon detectors in saturation regime by cw laser Method for haraterizing single oton detetors in saturation regime by w laser Jungmi Oh, Cristian Antonelli, 2 Moshe Tur, 3 and Misha Brodsky,* AT&T Labs, 2 S. Laurel Ave., Middletown, New Jersey 7748,

More information

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods Doug A. Bowman bowman@vt.edu Department of Computer Siene Virginia Teh Joseph L. Gabbard Deborah Hix [ jgabbard, hix]@vt.edu Systems Researh Center Virginia Teh A Survey of Usability Evaluation in Virtual

More information

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html CWCS Workshop May 2005 Programming Basis - FORTRAN 77 http://www.physis.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html Program Organization A FORTRAN program is just a sequene of lines of plain text.

More information

Chemical Computing. Peter Dittrich

Chemical Computing. Peter Dittrich in: Unonventional Programming Paradigms (UPP 2004), J.-P. Banatre, J.-L. Giavitto, P. Fradet, O. Mihel, Editors, LNCS 3566, pp. 19-32, Springer, Berlin, 2005 Chemial Computing Peter Dittrih Bio Systems

More information

Procurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully.

Procurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully. Deision Analysis Vol. 7, No. 1, Marh 2010, pp. 23 39 issn 1545-8490 eissn 1545-8504 10 0701 0023 informs doi 10.1287/dea.1090.0155 2010 INFORMS Managing Projet Failure Risk Through Contingent Contrats

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

Paid Placement Strategies for Internet Search Engines

Paid Placement Strategies for Internet Search Engines Paid Plaement Strategies for Internet Searh Engines Hemant K. Bhargava Smeal College of Business Penn State University 342 Beam Building University Park, PA 16802 bhargava@omputer.org Juan Feng Smeal College

More information

Downlink Scheduling and Radio Resource Allocation in Adaptive OFDMA Wireless Communication Systems for User-Individual QoS

Downlink Scheduling and Radio Resource Allocation in Adaptive OFDMA Wireless Communication Systems for User-Individual QoS Downlin Sheduling and Radio Resoure Alloation in Adaptive OFDMA Wireless Communiation Systems for User-Individual QoS Lu Yanhui, Wang Chunming, Yin Changhuan, and Yue Guangxin Abstrat In this paper, we

More information

Sborník vědeckých prací Vysoké školy báňské - Technické univerzity Ostrava číslo 2, rok 2006, ročník LII, řada strojní článek č.

Sborník vědeckých prací Vysoké školy báňské - Technické univerzity Ostrava číslo 2, rok 2006, ročník LII, řada strojní článek č. Sborník vědekýh praí Vysoké školy báňské - Tehniké univerzity Ostrava číslo 2, rok 2006, ročník LII, řada strojní článek č. 1544 Abstrat Sanda MIHALACHE *, Marian POPESCU ** and Alina BĂIEŞU ** PROPYLENE

More information

TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING

TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING INTERMAN 7 TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING by Douglas A. Ready, Albert A. Viere and Alan F. White RECEIVED 2 7 MAY 1393 International Labour

More information

Active Load Balancing in a Three-Phase Network by Reactive Power Compensation

Active Load Balancing in a Three-Phase Network by Reactive Power Compensation Ative Load Balaning in a hree-phase Network by eative Power Compensation Adrian Pană Politehnia University of imisoara omania. ntrodution. Brief overview of the auses, effets and methods to redue voltage

More information

Strategies for Development and Adoption of ERR in German Ambulatory Care

Strategies for Development and Adoption of ERR in German Ambulatory Care Strategies for Development and Adoption of ERR in German Ambulatory Care Sebastian Duennebeil 1, Ali Sunyaev 1, Jan Maro Leimeister 2, Helmut Krmar 1 1 Department of Informatis 1 Tehnishe Universitat MUnhen

More information

Heat Generation and Removal in Solid State Lasers

Heat Generation and Removal in Solid State Lasers Chapter 1 Heat Generation and Removal in Solid State Lasers V. Ashoori, M. Shayganmanesh and S. Radmard Additional information is available at the end of the hapter http://dx.doi.org/10.577/63 1. Introdution

More information

Isaac Newton. Translated into English by

Isaac Newton. Translated into English by THE MATHEMATICAL PRINCIPLES OF NATURAL PHILOSOPHY (BOOK 1, SECTION 1) By Isaa Newton Translated into English by Andrew Motte Edited by David R. Wilkins 2002 NOTE ON THE TEXT Setion I in Book I of Isaa

More information

Performance Rating of Unitary Air-Conditioning & Air-Source Heat Pump Equipment

Performance Rating of Unitary Air-Conditioning & Air-Source Heat Pump Equipment ANSI/AHRI Standard 210/240 with Addenda 1 and 2 (formerly ARI Standard 210/240) 2008 Standard for Performane Rating of Unitary Air-Conditioning & Air-Soure Heat Pump Equipment Approved by ANSI in Deember

More information

Real-time PCR solutions from sample preparation to data analysis

Real-time PCR solutions from sample preparation to data analysis PRODUCT OVERVIEW Real-time PCR Real-time PCR solutions from sample preparation to data analysis For over a quarter entury, we ve provided you with reliable reagents, instruments and software for all your

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

VOLUME 13, ARTICLE 5, PAGES 117-142 PUBLISHED 05 OCTOBER 2005 DOI: 10.4054/DemRes.2005.13.

VOLUME 13, ARTICLE 5, PAGES 117-142 PUBLISHED 05 OCTOBER 2005  DOI: 10.4054/DemRes.2005.13. Demographi Researh a free, expedited, online journal of peer-reviewed researh and ommentary in the population sienes published by the Max Plank Institute for Demographi Researh Konrad-Zuse Str. 1, D-157

More information

ROSE SCHOOL A SIMPLIFIED MECHANICS BASED PROCEDURE FOR THE SEISMIC RISK ASSESSMENT OF UNREINFORCED MASONRY BUILDINGS

ROSE SCHOOL A SIMPLIFIED MECHANICS BASED PROCEDURE FOR THE SEISMIC RISK ASSESSMENT OF UNREINFORCED MASONRY BUILDINGS I.U.S.S. Istituto Universitario di Studi Superiori di Pavia Università degli Studi di Pavia EUROPEAN SCHOOL OF ADVANCED STUDIES IN REDUCTION OF SEISMIC RISK ROSE SCHOOL A SIMPLIFIED MECHANICS BASED PROCEDURE

More information