Search results for " Soft"

showing 10 items of 1710 documents

Automatic regrouping of strata in the goodness-of-fit chi-square test

2019

Pearson’s chi-square test is widely employed in social and health sciences to analyze categorical data and contingency tables. For the test to be valid, the sample size must be large enough to provide a minimum number of expected elements per category. This paper develops functions for regrouping strata automatically no matter where they are located, thus enabling the goodness-of-fit test to be performed within an iterative procedure. The functions are written in Excel VBA (Visual Basic for Applications) and in Mathematica. The usefulness and performance of these functions is illustrated by means of a simulation study and the application to different datasets. Finally, the iterative use of …

Contingency tableComputer scienceContinuous Sample of Working Lives62G10 62P25MathematicaSample (statistics):62 Statistics::62P Applications [Classificació AMS]Visual Basic for ApplicationsEconomiaTest (assessment):62 Statistics::62G Nonparametric inference [Classificació AMS]Goodness of fitFinancesSample size determination:Matemàtiques i estadística::Estadística matemàtica [Àrees temàtiques de la UPC]StatisticsVisual Basic for ApplicationsChi-square testGoodness-of-fit chi-square test statistical software Visual Basic for Applications Mathematica Continuous Sample of Working Livesstatistical softwareGoodness-of-fit chi-square testEconometríaCategorical variable
researchProduct

The Research Project on the Principles of BRICS Commercial Contracts Law. An Introduction

2022

The paper presents the main features of the project “The Principles of BRICS Contract Law” and investigates the possible foundations of a common system of international commercial contract law within the BRICS’ network.

Contract law comparative law BRICS soft lawComparative law; contract law; BRICSBRICScontract lawSettore IUS/02 - Diritto Privato ComparatoComparative law
researchProduct

The Principles of BRICS Contract Law

2022

This book examines national reports on contract law in each of the BRICS countries (Brazil, Russia, India, China and South Africa) in order to provide a comparative analysis. It then establishes common principles, where possible, as well as a set of general “soft law” principles governing international commercial contracts in these countries.

Contract law comparative law BRICS soft lawSettore IUS/02 - Diritto Privato Comparato
researchProduct

Gravity effects on mixing with magnetic micro-convection in microfluidics.

2018

Mixing remains an important problem for development of successful microfluidic and lab-on-a-chip devices, where simple and predictable systems are particularly interesting. One is magnetic micro-convection, an instability happening on the interface of miscible magnetic and non-magnetic fluids in a Hele-Shaw cell under applied field. Previous work proved that Brinkman model quantitatively explains the experiments. However, a gravity caused convective motion complicated the tests. Here we first improve the experimental system to exclude the gravitational convective motion. Afterwards, we observe and quantify how gravity and laminar flow play an important role in stabilizing the perturbations …

ConvectionGravity (chemistry)Field (physics)BiophysicsFOS: Physical sciences02 engineering and technologyCondensed Matter - Soft Condensed Matter01 natural sciencesInstability010305 fluids & plasmasGravitationPhysics::Fluid Dynamics0103 physical sciencesGeneral Materials ScienceCritical fieldMixing (physics)PhysicsFluid Dynamics (physics.flu-dyn)Laminar flowSurfaces and InterfacesGeneral ChemistryMechanicsPhysics - Fluid Dynamics021001 nanoscience & nanotechnologySoft Condensed Matter (cond-mat.soft)0210 nano-technologyBiotechnologyThe European physical journal. E, Soft matter
researchProduct

Cell-List based Molecular Dynamics on Many-Core Processors: A Case Study on Sunway TaihuLight Supercomputer

2020

Molecular dynamics (MD) simulations are playing an increasingly important role in several research areas. The most frequently used potentials in MD simulations are pair-wise potentials. Due to the memory wall, computing pair-wise potentials on many-core processors are usually memory bounded. In this paper, we take the SW26010 processor as an exemplary platform to explore the possibility to break the memory bottleneck by improving data reusage via cell-list-based methods. We use cell-lists instead of neighbor-lists in the potential computation, and apply a number of novel optimization methods. Theses methods include: an adaptive replica arrangement strategy, a parameter profile data structur…

CoprocessorCell lists010304 chemical physicsComputer scienceReplica020207 software engineering02 engineering and technologyParallel computingSupercomputerData structure01 natural sciencesBottleneckMolecular dynamics0103 physical sciencesScalability0202 electrical engineering electronic engineering information engineeringSunway TaihuLightSC20: International Conference for High Performance Computing, Networking, Storage and Analysis
researchProduct

Unauthorized copying of software

2007

Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of computer software, and we then asked how these results compared with the theoretical reasons offered by computer ethics scholars. The results shed a new light on students' mor…

CopyingComputingMilieux_THECOMPUTINGPROFESSIONbusiness.industryComputer scienceComputer ethicsPublic relationsIntellectual propertyComputer usersSoftwareEmpirical researchOrder (business)Computer softwareGeneral Earth and Planetary SciencesbusinessGeneral Environmental ScienceACM SIGCAS Computers and Society
researchProduct

Attitudes to and factors affecting unauthorized copying of computer software in Finland

2005

Several quantitative studies have sought to determine the factors affecting the unauthorized copying of software, particularly in North America. However, we find no statistically reliable studies on the situation in Europe. In order to address this gap in the literature, we explored the attitudes to and factors affecting the unauthorized copying of computer software of 249 Finnish university students: nine hypotheses derived from the existing research on unauthorized copying of computer software or theories of ethics were tested. A quantitative questionnaire was used as the research instrument. The results shed new light on the characteristics of users and factors affecting the unauthorized…

CopyingInfluence factorbusiness.industryInternet privacyGeneral Social SciencesComputingMilieux_LEGALASPECTSOFCOMPUTINGHuman-Computer InteractionSoftwareArts and Humanities (miscellaneous)Computer softwareDevelopmental and Educational PsychologyPsychologybusinessSocial psychologyBehaviour & Information Technology
researchProduct

Integrated Simulation and Formal Verification of a Simple Autonomous Vehicle

2018

This paper presents a proof-of-concept application of an approach to system development based on the integration of formal verification and co-simulation. A simple autonomous vehicle has the task of reaching an assigned straight path and then follow it, and it can be controlled by varying its turning speed. The correctness of the proposed control law has been formalized and verified by interactive theorem proving with the Prototype Verification System. Concurrently, the system has been co-simulated using the Prototype Verification System and the MathWorks Simulink tool: The vehicle kinematics have been simulated in Simulink, whereas the controller has been modeled in the logic language of t…

CorrectnessSIMPLE (military communications protocol)Computer scienceProof assistant020207 software engineeringControl engineering02 engineering and technologyFormal methods Software engineering Theorem proving Vehicles Autonomous Vehicles Control laws Integrated simulations Interactive theorem proving Logic languages Proof of concept Prototype verification systems System development020202 computer hardware & architectureAutomated theorem provingSettore ING-INF/04 - AutomaticaControl theory0202 electrical engineering electronic engineering information engineeringPrototype Verification SystemFormal verificationLogic programming
researchProduct

Lambda+, the renewal of the Lambda Architecture: Category Theory to the rescue

2021

Designing software architectures for Big Data is a complex task that has to take into consideration multiple parameters, such as the expected functionalities, the properties that are untradeable, or the suitable technologies. Patterns are abstractions that guide the design of architectures to reach the requirements. One of the famous patterns is the Lambda Architecture, which proposes real-time computations with correctness and fault-tolerance guarantees. But the Lambda has also been highly criticized, mostly because of its complexity and because the real-time and correctness properties are each effective in a different layer but not in the overall architecture. Furthermore, its use cases a…

Correctness[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Computer sciencebusiness.industryDistributed computingBig data020207 software engineering02 engineering and technologyLambdaArchitecture patternComputer Science::Hardware ArchitectureSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Use caseArchitectureLayer (object-oriented design)Category theorybusinessComputingMilieux_MISCELLANEOUSLambda ArchitectureCategory theory
researchProduct

A framework for evaluating Internet-of-Things platforms: Application provider viewpoint

2014

Widespread adoption of Internet of Things (IoT) applications assumes a sustainable ecosystem of firms creating, distributing, and using these applications. Such an ecosystem often forms around a platform that implements commonly used functionality and offers it to the members of the ecosystem for creating applications and services. In IoT, such a platform may be materialized in a form of a cloud platform that supports the management of connected devices, and the development and use of the applications based on them. A number of cloud platforms targeting IoT applications are available in the market; to prosper, they need to assist the providers of the IoT applications in designing and develo…

Cover (telecommunications)Javabusiness.industryComputer scienceCloud computingApplication softwarecomputer.software_genreMaturity (finance)World Wide WebSoftwareThe InternetbusinessInternet of Thingscomputercomputer.programming_language2014 IEEE World Forum on Internet of Things (WF-IoT)
researchProduct