Search results for "Tribute"
showing 10 items of 1455 documents
A holistic approach to manage environmental quality by using the Kano model and social cognitive theory
2020
International audience; Since its first proposition in 1984, the Kano model has been used extensively in a variety of contexts within industries and academic research demonstrating its wide applicability. The Kano model allows for describing the relationship between an objective aspect and a subjective aspect. Yet is this relevant for environmental quality as well? In this study, we explore the cases where the Kano model is used for assessing environmental quality and its perception by consumers and identify the potential influencing factors for its application with this respect. We find that the Kano model can serve as an effective tool for converging towards environmental quality and sust…
XML Enabled Metamodeling and Tools for Cooperative Information Systems
2001
The development of tools to support semantic resolution is a key issue in the design of heterogeneous interoperable information systems. This paper presents a methodology and a data model translator toolkit, called X-TIME, for the design and management of interoperable information systems. X-TIME combines a metamodelling approach and XML features to provide support for automated design of wrappers or semantic reconciliators. It is a flexible semantics oriented approach that takes into account several important characteristics of interoperable information systems, including extensibility and composability. Extensibility requires a translation scheme that can easily integrate new data models.…
Analysis and validation in design time of distributed control systems implemented by means of rule based expert systems
2005
In this paper a new analytical method for control systems validation is presented. The control system will be implemented by means of expert systems based on rule nets, which are a formalism that seeks to express an automatism in a similar way to as would make it a human being: "IF antecedents THEN consequent". But at the same time rule nets are a tool for the design, analysis and implementation of rule based systems (RBS), and consist on a mathematic-logical structure which analytically reflects the set of rules that the human expert has designed. The validation consist on the analysis of the decisive rule nets properties in design time. This properties have been studied and formalized com…
Values and attributes of volleyball by the fans in the FIVB Men's World Championships 2014
2015
As the world of sport is encountering challenges, such as intensified competition, fragmented markets and loss of commitment, there is a need to discover new insights of the global sport consumers to gain more understanding of their behavior. Volleyball world is not an exception as regards the challenges. Despite its popularity, however, volleyball has not been researched as widely as for example football. The purpose of this master’s thesis was to investigate the image of volleyball through the perceived attributes the spectating fans link to this discipline in the context of an international tournament. Namely fans are the consumers in sport world and work as co-creators of sport events. …
Robust control in uncertain multi-inventory systems and consensus problems
2008
Abstract We consider a continuous time linear multi–inventory system with unknown demands bounded within ellipsoids and controls bounded within polytopes. We address the problem of ∈-stabilizing the inventory since this implies some reduction of the inventory costs. The main results are certain conditions under which ∈-stabilizability is possible through a saturated linear state feedback control. The idea of this approach is similar to the consensus problem solution for a network of continuous time dynamic agents, where each agent evolves according to a first order dynamics has bounded control and it is subject to unknown but bounded disturbances. In this context, we derive conditions under…
Dynamic Ordering of Firewall Rules Using a Novel Swapping Window-based Paradigm
2016
Designing and implementing efficient firewall strategies in the age of the Internet of Things (IoT) is far from trivial. This is because, as time proceeds, an increasing number of devices will be connected, accessed and controlled on the Internet. Additionally, an ever-increasingly amount of sensitive information will be stored on various networks. A good and effi- cient firewall strategy will attempt to secure this information, and to also manage the large amount of inevitable network traffic that these devices create. The goal of this paper is to propose a framework for designing optimized firewalls for the IoT. This paper deals with two fundamental challenges/problems encountered in such…
Scheduling Domestic Shiftable Loads in Smart Grids: A Learning Automata-Based Scheme
2017
In this paper, we consider the problem of scheduling shiftable loads, over multiple users, in smart grids. We approach the problem, which is becoming increasingly pertinent in our present energy-thirsty society, using a novel distributed game-theoretic framework. From a modeling perspective, the distributed scheduling problem is formulated as a game, and in particular, a so-called “Potential” game. This game has at least one pure strategy Nash Equilibrium (NE), and we demonstrate that the NE point is a global optimal point. The solution that we propose, which is the pioneering solution that incorporates the theory of Learning Automata (LA), permits the total supplied loads to approach the p…
A nested virtualization tool for information technology practical education
2016
Background A common problem of some information technology courses is the difficulty of providing practical exercises. Although different approaches have been followed to solve this problem, it is still an open issue, specially in security and computer network courses. Results This paper proposes NETinVM, a tool based on nested virtualization that includes a fully functional lab, comprising several computers and networks, in a single virtual machine. It also analyzes and evaluates how it has been used in different teaching environments. Conclusions The results show that this tool makes it possible to perform demos, labs and practical exercises, greatly appreciated by the students, that woul…
Characterizing the Invasive Tumor Front of Aggressive Uterine Adenocarcinoma and Leiomyosarcoma
2021
The invasive tumor front (the tumor–host interface) is vitally important in malignant cell progression and metastasis. Tumor cell interactions with resident and infiltrating host cells and with the surrounding extracellular matrix and secreted factors ultimately determine the fate of the tumor. Herein we focus on the invasive tumor front, making an in-depth characterization of reticular fiber scaffolding, infiltrating immune cells, gene expression, and epigenetic profiles of classified aggressive primary uterine adenocarcinomas (24 patients) and leiomyosarcomas (11 patients). Sections of formalin-fixed samples before and after microdissection were scanned and studied. Reticular fiber archit…
Optimizing the Sampling Area across an Old-Growth Forest via UAV-Borne Laser Scanning, GNSS, and Radial Surveying
2022
Aboveground biomass, volume, and basal area are among the most important structural attributes in forestry. Direct measurements are cost-intensive and time-consuming, especially for old-growth forests exhibiting a complex structure over a rugged topography. We defined a methodology to optimize the plot size and the (total) sampling area, allowing for structural attributes with a tolerable error to be estimated. The plot size was assessed by analyzing the semivariogram of a CHM model derived via UAV laser scanning, while the sampling area was based on the calculation of the absolute relative error as a function of allometric relationships. The allometric relationships allowed the structural …