Search results for "PROTOCOL"

showing 10 items of 1808 documents

Firefly algorithm based upon slicing structure encoding for unequal facility layout problem

2019

Finding the locations of departments or machines in a workspace is classified as a Facility Layout Problem. Good placement of departments has a relevant influence on manufacturing costs, work in process, lead times and production efficiency. This paper analyses the problem of allocating departments with restrictions in terms of unequal area and rectangular shape within a facility, in order to minimize the sum of material handling costs taking into account the satisfaction of the aspect ratio requested. In particular, we propose for the first time a Firefly Algorithm based on the slicing structure encoding. The proposed method was tested comparing the results obtained from other authors on t…

Structure (mathematical logic)Firefly protocollcsh:T55.4-60.8Computer scienceSlicingFacility layout problemFirefly algorithm Problem; Slicing structure; Unequal area-facility layoutIndustrial and Manufacturing EngineeringEncoding (memory)Settore ING-IND/17 - Impianti Industriali MeccaniciFirefly algorithm Problem Slicing structure Unequal area-facility layoutFirefly Algorithmlcsh:Industrial engineering. Management engineeringFirefly algorithmUnequal Area-Facility Layout ProblemSlicing Structurelcsh:Production management. Operations managementlcsh:TS155-194AlgorithmInternational Journal of Industrial Engineering Computations
researchProduct

An analysis of ego network communities and temporal a affinity for online social networks

2017

The wide diffusion of Online Social Networks (OSNs) presents several advantages, like the definition of simple tools for information sharing and spreading. However, OSNs present also some drawbacks, one of the most important one is the problem of privacy disclosures. Distributed Online Social Networks (DOSNs), which decentralize the control of the social network, have been recently proposed to overcome these issues. The decentralization of the control has issued several challenges, one of the main ones is guaranteeing data availability without relying on a central server. To define users’ data allocation strategies, the knowledge of the structure of the ego network and of the user’ temporal…

Structure (mathematical logic)SIMPLE (military communications protocol)Social networkCommunity detectionSettore INF/01 - Informaticabusiness.industryComputer Networks and CommunicationsInformation sharingControl (management)020206 networking & telecommunications02 engineering and technologyData scienceDecentralizationField (computer science)Data availabilityOrder (exchange)020204 information systems0202 electrical engineering electronic engineering information engineeringSociologyP2P social networkSocial sciencebusinessTemporal affinityDOSN
researchProduct

Thermodynamics of Nanoparticles: Experimental Protocol Based on a Comprehensive Ginzburg-Landau Interpretation

2014

MATERIAUX+SMR:SDA; The effects of surface and interface on the thermodynamics of small particles require a deeper understanding. This step is crucial for the development of models that can be used for decision-making support to design nanomaterials with original properties. On the basis of experimental results for phase transitions in compressed ZnO nanoparticles, we show the limitations of classical thermodynamics approaches (Gibbs and Landau). We develop a new model based on the Ginzburg-Landau theory that requires the consideration of several terms, such as the interaction between nanoparticles, pressure gradients, defect density, and so on. This phenomenological approach sheds light on …

Surface (mathematics)Models MolecularPhase transitionCompressive StrengthInterface (Java)ThermodynamicsNanoparticleBioengineeringPhase TransitionInterpretation (model theory)Theoretical physics[ CHIM.CATA ] Chemical Sciences/CatalysisPressureGeneral Materials ScienceComputer SimulationStatistical physicsProtocol (object-oriented programming)Ginzburg landauBasis (linear algebra)ChemistryMechanical EngineeringGeneral Chemistry[CHIM.CATA]Chemical Sciences/CatalysisCondensed Matter Physics[SDE.ES]Environmental Sciences/Environmental and SocietyEnergy TransferModels ChemicalNanoparticlesThermodynamicsZinc Oxide[ SDE.ES ] Environmental Sciences/Environmental and Society
researchProduct

NEITHER AUTHORIZED NOR PROHIBITED? SECESSION AND INTERNATIONAL LAW AFTER KOSOVO, SOUTH OSSETIA AND ABKHAZIA

2008

The flexibility mechanisms introduced by the Kyoto Protocol on climate change promote the realization of climate change related investment projects which aim to contribute both to the fight against climate change as well as to foster sustainable development patterns in host countries. At first glance, the flexibility mechanisms seem to represent paradigmatic examples of green economy instruments which have numerous potential benefits. However, the implementation of such mechanisms may give rise to some negative environmental externalities which have the consequence of creating a new type of investment versus environment conflict, characterized by a new form of conflict with an internal envi…

Sustainable developmentPolitical economy of climate changeGlobal warmingIUS/13 - DIRITTO INTERNAZIONALEInvestment (macroeconomics)Green economyGeographyuse of forceright to self-determinationSustainabilitySustainability and systemic change resistanceKyoto ProtocolSettore IUS/13 - Diritto InternazionaleEconomic systemEnvironmental planningUN Security CouncilsecessionThe Italian Yearbook of International Law Online
researchProduct

A Hidden Markov Model for Automatic Generation of ER Diagrams from OWL Ontology

2014

Connecting ontological representations and data models is a crucial need in enterprise knowledge management, above all in the case of federated enterprises where corporate ontologies are used to share information coming from different databases. OWL to ERD transformations are a challenging research field in this scenario, due to the loss of expressiveness arising when OWL axioms have to be represented using ERD notation. In this paper we propose an innovative technique for estimating the most likely composition of ERD constructs that correspond to a given sequence of OWL axioms. We model such a process using a Hidden Markov Model (HMM) where the OWL inputs are the observable states, while E…

Syntax (programming languages)Computer sciencebusiness.industrycomputer.internet_protocolWeb Ontology Languagecomputer.software_genreNotationOWL-SData modelingSet (abstract data type)Entity–relationship modelArtificial intelligenceHidden Markov modelbusinesscomputerNatural language processingcomputer.programming_language2014 IEEE International Conference on Semantic Computing
researchProduct

Implementing a Service-Oriented Architecture: A Technochange Approach

2013

This research reports on a longitudinal field study focusing on the implementation process of a service-oriented architecture (SOA) in a public institution of Norway. Findings illustrate how the organization gradually breaks down technical and organizational silos by creating a cross-silo mindset among the employees in the organization and the system developers in particular. We describe how the organization under study achieves integration by transforming organizational structure and system development practices and by introducing governance principles. We argue that a SOA program as such is a complex, risky, and enterprise-wide initiative, which requires a technochange management approach.

System developmentProcess managementComputer scienceProcess (engineering)computer.internet_protocolCorporate governancePublic institutionMindsetOrganizational structureService-oriented architectureArchitecturecomputer
researchProduct

An analytical model of a new packet marking algorithm for TCP flows

2005

In Differentiated Services networks, packets may receive a different treatment according to their Differentiateo Services Code Point (DSCP) label. As a consequence, packet marking schemes can also be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the performance experienced. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing (i) the TCP sources aggregate, (ii) the marker, and (iii) the network status. Preliminary simulation results show quite accurate predictions for throughput and average queue occupancy. Besides, the research…

TCP accelerationComputer Networks and CommunicationsComputer scienceTransmission Control ProtocolTCP tuningThroughputRandom early detectionRound-trip delay timeH-TCPActive queue managementTCP sequence prediction attackComputer securitycomputer.software_genrelaw.inventionTCP Westwood plusTCP Friendly Rate ControlPacket switchinglawInternet ProtocolZeta-TCPQueueNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSToken bucketTelecommunications networkTCP global synchronizationDifferentiated servicesNetwork servicebusinesscomputerComputer network
researchProduct

Trattamento delle manifestazioni vascolari nella Sclerosi Sistemica e qualità della vita: nuovo protocollo

2005

TRATTAMENTO DELLE MANIFESTAZIONI VASCOLARI NELLA SCLEROSI SISTEMICA E QUALITA’ DELLA VITA: NUOVO PROTOCOLLO
researchProduct

Exploiting programmable architectures for WiFi/ZigBee inter-technology cooperation

2014

The increasing complexity of wireless standards has shown that protocols cannot be designed once for all possible deployments, especially when unpredictable and mutating interference situations are present due to the coexistence of heterogeneous technologies. As such, flexibility and (re)programmability of wireless devices is crucial in the emerging scenarios of technology proliferation and unpredictable interference conditions. In this paper, we focus on the possibility to improve coexistence performance of WiFi and ZigBee networks by exploiting novel programmable architectures of wireless devices able to support run-time modifications of medium access operations. Differently from software…

Technology and EngineeringCognitive networksComputer Networks and CommunicationsComputer scienceDynamic MAC adaptationTime division multiple access02 engineering and technologyMAC protocolMAC protocols0202 electrical engineering electronic engineering information engineeringWirelessCross-technology interferenceINTERFERENCEProtocol prototypingSettore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsCognitive networkComputer Science ApplicationsEmbedded systemSignal ProcessingInterference avoidanceIBCNWireless network control020201 artificial intelligence & image processingbusinessCognitive networkDecoupling (electronics)Communication channelComputer networkEURASIP Journal on Wireless Communications and Networking
researchProduct

Technologies supporting vision screening: a protocol for a scoping review

2021

Introduction Vision problems affect academic performance, social and mental health. Most traditional vision screening methods rely on human expert assessments based on a set of vision tests. As technology advances, new instruments and computerised tools are available for complementing vision screening. The scoping review based on this protocol aims to investigate current technologies for vision screening, what vision tests can be complemented by technologies, and how these can support vision screening by providing measurements. Methods and analysis The planned review will utilise the PRISMA extension for Scoping Reviews (PRISMA-ScR) tool. Electronic search will be performed in databases, i…

Technologygenetic structuresprotocols & guidelinesPeer ReviewMEDLINEHealth InformaticsLogic modelHealth informaticsquality in health careVision Screeninginformation technologyReference management software1702HumansMedicine1506Vision testProtocol (science)business.industryRInformation technologyGeneral Medicineeducation & training (see medical education & training)Data scienceReview Literature as TopicMental HealthMedicineThematic analysisbusinesscommunity child healthSystematic Reviews as Topic
researchProduct