Search results for " Soft"
showing 10 items of 1710 documents
Automatic regrouping of strata in the goodness-of-fit chi-square test
2019
Pearson’s chi-square test is widely employed in social and health sciences to analyze categorical data and contingency tables. For the test to be valid, the sample size must be large enough to provide a minimum number of expected elements per category. This paper develops functions for regrouping strata automatically no matter where they are located, thus enabling the goodness-of-fit test to be performed within an iterative procedure. The functions are written in Excel VBA (Visual Basic for Applications) and in Mathematica. The usefulness and performance of these functions is illustrated by means of a simulation study and the application to different datasets. Finally, the iterative use of …
The Research Project on the Principles of BRICS Commercial Contracts Law. An Introduction
2022
The paper presents the main features of the project “The Principles of BRICS Contract Law” and investigates the possible foundations of a common system of international commercial contract law within the BRICS’ network.
The Principles of BRICS Contract Law
2022
This book examines national reports on contract law in each of the BRICS countries (Brazil, Russia, India, China and South Africa) in order to provide a comparative analysis. It then establishes common principles, where possible, as well as a set of general “soft law” principles governing international commercial contracts in these countries.
Gravity effects on mixing with magnetic micro-convection in microfluidics.
2018
Mixing remains an important problem for development of successful microfluidic and lab-on-a-chip devices, where simple and predictable systems are particularly interesting. One is magnetic micro-convection, an instability happening on the interface of miscible magnetic and non-magnetic fluids in a Hele-Shaw cell under applied field. Previous work proved that Brinkman model quantitatively explains the experiments. However, a gravity caused convective motion complicated the tests. Here we first improve the experimental system to exclude the gravitational convective motion. Afterwards, we observe and quantify how gravity and laminar flow play an important role in stabilizing the perturbations …
Cell-List based Molecular Dynamics on Many-Core Processors: A Case Study on Sunway TaihuLight Supercomputer
2020
Molecular dynamics (MD) simulations are playing an increasingly important role in several research areas. The most frequently used potentials in MD simulations are pair-wise potentials. Due to the memory wall, computing pair-wise potentials on many-core processors are usually memory bounded. In this paper, we take the SW26010 processor as an exemplary platform to explore the possibility to break the memory bottleneck by improving data reusage via cell-list-based methods. We use cell-lists instead of neighbor-lists in the potential computation, and apply a number of novel optimization methods. Theses methods include: an adaptive replica arrangement strategy, a parameter profile data structur…
Unauthorized copying of software
2007
Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of computer software, and we then asked how these results compared with the theoretical reasons offered by computer ethics scholars. The results shed a new light on students' mor…
Attitudes to and factors affecting unauthorized copying of computer software in Finland
2005
Several quantitative studies have sought to determine the factors affecting the unauthorized copying of software, particularly in North America. However, we find no statistically reliable studies on the situation in Europe. In order to address this gap in the literature, we explored the attitudes to and factors affecting the unauthorized copying of computer software of 249 Finnish university students: nine hypotheses derived from the existing research on unauthorized copying of computer software or theories of ethics were tested. A quantitative questionnaire was used as the research instrument. The results shed new light on the characteristics of users and factors affecting the unauthorized…
Integrated Simulation and Formal Verification of a Simple Autonomous Vehicle
2018
This paper presents a proof-of-concept application of an approach to system development based on the integration of formal verification and co-simulation. A simple autonomous vehicle has the task of reaching an assigned straight path and then follow it, and it can be controlled by varying its turning speed. The correctness of the proposed control law has been formalized and verified by interactive theorem proving with the Prototype Verification System. Concurrently, the system has been co-simulated using the Prototype Verification System and the MathWorks Simulink tool: The vehicle kinematics have been simulated in Simulink, whereas the controller has been modeled in the logic language of t…
Lambda+, the renewal of the Lambda Architecture: Category Theory to the rescue
2021
Designing software architectures for Big Data is a complex task that has to take into consideration multiple parameters, such as the expected functionalities, the properties that are untradeable, or the suitable technologies. Patterns are abstractions that guide the design of architectures to reach the requirements. One of the famous patterns is the Lambda Architecture, which proposes real-time computations with correctness and fault-tolerance guarantees. But the Lambda has also been highly criticized, mostly because of its complexity and because the real-time and correctness properties are each effective in a different layer but not in the overall architecture. Furthermore, its use cases a…
A framework for evaluating Internet-of-Things platforms: Application provider viewpoint
2014
Widespread adoption of Internet of Things (IoT) applications assumes a sustainable ecosystem of firms creating, distributing, and using these applications. Such an ecosystem often forms around a platform that implements commonly used functionality and offers it to the members of the ecosystem for creating applications and services. In IoT, such a platform may be materialized in a form of a cloud platform that supports the management of connected devices, and the development and use of the applications based on them. A number of cloud platforms targeting IoT applications are available in the market; to prosper, they need to assist the providers of the IoT applications in designing and develo…