Search results for "computer.programming_language"
showing 10 items of 986 documents
Gaussian quadrature rule for arbitrary weight function and interval
2005
Abstract A program for calculating abscissas and weights of Gaussian quadrature rules for arbitrary weight functions and intervals is reported. The program is written in Mathematica. The only requirement is that the moments of the weight function can be evaluated analytically in Mathematica. The result is a FORTRAN subroutine ready to be utilized for quadrature. Program summary Title of program: AWGQ Catalogue identifier:ADVB Program summary URL: http://cpc.cs.qub.ac.uk/summaries/ADVB Program obtained from: CPC Program Library, Queens University, Belfast, N. Ireland Computer for which the program is designed and others on which it has been tested: Computers: Pentium IV 1.7 GHz processor Ins…
A Java-based Wrapper for Wireless Communications
2008
The increasing number of new applications for mobile devices in pervasive environments, do not cope with changes in the wireless communications. Developers of such applications have to deal with problems arising from the available wireless connections in the given environment. A middleware is a solution that allows to overcome some of these problems. It provides to the applications a set of functions that facilitate their development. In this paper we present a Java-based communication wrapper, called SmartTraffic, which allows programmers to seamlessly use TCP or UDP protocols over Bluetooth or any IP-based wireless network. Developers can use SmartTraffic within their Java applications, t…
A methodology for evaluation of operational zones for distributed generation based on DFIG
2017
This study developed a methodology to determine zones of acceptable voltage profiles for wind power generation connected to distribution systems. Three load profiles (residential, commercial and industrial) connected to the distribution network were analyzed considering the impact on voltage levels and steady-state stability for different wind speeds and wind generator control strategies. The wind generator model is based on doubly fed induction generator (DFIG) and were developed using Matlab/Simulink. The presented methodology can be used to map the impact on operation of different types of control, the time of day and the available wind speed and it is not limited only for DFIG. The resu…
Parameters identification of the complex impedance model of the PEM fuel cell using Matlab/Simulink
2017
In this work, we present a new technical method for identifying the complex impedance model parameters of a Proton Exchange Membrane (pEM) Fuel Cell for on-board diagnosis in real time. The study of the PEM Fuel Cell modelling is important in order to understand the physical phenomena that occurring in this green renewable energy source. A diagnosis method is presented by analyzing the behavior of the complex impedance. For this, we present the identification method of the various complex impedance parameters; this identification is based on mathematical methods using the least squares method and the interpolation analysis method. The results are obtained using Matlab/Simulink tools and all…
Publication Network Analysis of an Academic Family in Information Systems
2011
The study of scientific collaboration through network analysis can give interesting conclusions about the publication habits of a scientific community. Co-authorship networks represent scientific collaboration as a graph: nodes correspond to authors, edges between nodes mark joint publications (Newman 2001a,b). Scientific publishing is decentralized. Choices of co-authors and research topics are seldomly globally coordinated. Still, the structure of co-authorship networks is far from random. Co-authorship networks are governed by principles that are similar in other complex networks such as social networks (Wasserman and Faust 1994), networks of citations between scientific papers (Egghe an…
Ontology-Based Information System
2014
We describe a novel way for creating information systems based on ontologies. The described solution is aimed at domain experts who would benefit from being able to quickly prototype fully-functional, web-based information system for data input, editing and analysis. The systems backbone is SPARQL 1.1 endpoint that enables organization users to view and edit the data, while outside users can get read-only access to the endpoint. The system prototype is implemented and successfully tested with Latvian medical data ontology with 60 classes and imported 5 000 000 data-level triples.
Library for model querying
2012
Query and transformation languages make it easy to work with models, but they are bound to one particular data store. That makes them hard to adopt in projects where data is stored in a different repository, which hinders more widespread use of transformations and models. Instead of adopting a transformation language to a new data store, we propose to build a query and transformation library for the general-purpose language that is already used in a project. In this paper we demonstrate that it can be easily by implementing such a library for an EMOF-like data store in the Lua language.
HTML - Hypertext Markup Language
1997
A novel policy-driven reversible anonymisation scheme for XML-based services
2015
Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…
Enforcing role based access control model with multimedia signatures.
2009
International audience; Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control languag…