Search results for "computer.programming_language"

showing 10 items of 986 documents

Gaussian quadrature rule for arbitrary weight function and interval

2005

Abstract A program for calculating abscissas and weights of Gaussian quadrature rules for arbitrary weight functions and intervals is reported. The program is written in Mathematica. The only requirement is that the moments of the weight function can be evaluated analytically in Mathematica. The result is a FORTRAN subroutine ready to be utilized for quadrature. Program summary Title of program: AWGQ Catalogue identifier:ADVB Program summary URL: http://cpc.cs.qub.ac.uk/summaries/ADVB Program obtained from: CPC Program Library, Queens University, Belfast, N. Ireland Computer for which the program is designed and others on which it has been tested: Computers: Pentium IV 1.7 GHz processor Ins…

Weight functionComputer scienceFortranMathematicsofComputing_NUMERICALANALYSISGeneral Physics and AstronomyGauss–Kronrod quadrature formulaTanh-sinh quadratureQuadrature (mathematics)symbols.namesakeHardware and ArchitecturesymbolsGaussian quadratureAlgorithmcomputerClenshaw–Curtis quadratureTest datacomputer.programming_languageComputer Physics Communications
researchProduct

A Java-based Wrapper for Wireless Communications

2008

The increasing number of new applications for mobile devices in pervasive environments, do not cope with changes in the wireless communications. Developers of such applications have to deal with problems arising from the available wireless connections in the given environment. A middleware is a solution that allows to overcome some of these problems. It provides to the applications a set of functions that facilitate their development. In this paper we present a Java-based communication wrapper, called SmartTraffic, which allows programmers to seamlessly use TCP or UDP protocols over Bluetooth or any IP-based wireless network. Developers can use SmartTraffic within their Java applications, t…

Wi-Fi arrayJavaWireless networkbusiness.industryComputer sciencepervasive systemsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computinglaw.inventionBluetoothWireless site surveylawMiddlewareWirelessbusinesscomputercomputer.programming_languageComputer network2008 International Conference on Complex, Intelligent and Software Intensive Systems
researchProduct

A methodology for evaluation of operational zones for distributed generation based on DFIG

2017

This study developed a methodology to determine zones of acceptable voltage profiles for wind power generation connected to distribution systems. Three load profiles (residential, commercial and industrial) connected to the distribution network were analyzed considering the impact on voltage levels and steady-state stability for different wind speeds and wind generator control strategies. The wind generator model is based on doubly fed induction generator (DFIG) and were developed using Matlab/Simulink. The presented methodology can be used to map the impact on operation of different types of control, the time of day and the available wind speed and it is not limited only for DFIG. The resu…

Wind power generationbusiness.industryComputer science020209 energy02 engineering and technologyAC powerStability (probability)Wind speedAutomotive engineeringlaw.inventionlawDistributed generation0202 electrical engineering electronic engineering information engineeringMATLABbusinesscomputerDoubly fed electric machineVoltagecomputer.programming_language2017 IEEE 6th International Conference on Renewable Energy Research and Applications (ICRERA)
researchProduct

Parameters identification of the complex impedance model of the PEM fuel cell using Matlab/Simulink

2017

In this work, we present a new technical method for identifying the complex impedance model parameters of a Proton Exchange Membrane (pEM) Fuel Cell for on-board diagnosis in real time. The study of the PEM Fuel Cell modelling is important in order to understand the physical phenomena that occurring in this green renewable energy source. A diagnosis method is presented by analyzing the behavior of the complex impedance. For this, we present the identification method of the various complex impedance parameters; this identification is based on mathematical methods using the least squares method and the interpolation analysis method. The results are obtained using Matlab/Simulink tools and all…

Work (thermodynamics)Engineeringbusiness.industryMatlab simulink[SPI] Engineering Sciences [physics]Proton exchange membrane fuel cellControl engineering02 engineering and technology010402 general chemistry021001 nanoscience & nanotechnology01 natural sciences7. Clean energy0104 chemical sciencesIdentification (information)[SPI]Engineering Sciences [physics]Physical phenomenaPhysics::Chemical Physics0210 nano-technologyMATLABbusinesscomputerElectrical impedanceComputingMilieux_MISCELLANEOUSInterpolationcomputer.programming_language
researchProduct

Publication Network Analysis of an Academic Family in Information Systems

2011

The study of scientific collaboration through network analysis can give interesting conclusions about the publication habits of a scientific community. Co-authorship networks represent scientific collaboration as a graph: nodes correspond to authors, edges between nodes mark joint publications (Newman 2001a,b). Scientific publishing is decentralized. Choices of co-authors and research topics are seldomly globally coordinated. Still, the structure of co-authorship networks is far from random. Co-authorship networks are governed by principles that are similar in other complex networks such as social networks (Wasserman and Faust 1994), networks of citations between scientific papers (Egghe an…

World Wide WebBetweenness centralityComputer-supported cooperative workInformation systemFAUSTGraph (abstract data type)Library scienceComplex networkCentralitycomputerEvolutionary computationcomputer.programming_language
researchProduct

Ontology-Based Information System

2014

We describe a novel way for creating information systems based on ontologies. The described solution is aimed at domain experts who would benefit from being able to quickly prototype fully-functional, web-based information system for data input, editing and analysis. The systems backbone is SPARQL 1.1 endpoint that enables organization users to view and edit the data, while outside users can get read-only access to the endpoint. The system prototype is implemented and successfully tested with Latvian medical data ontology with 60 classes and imported 5 000 000 data-level triples.

World Wide WebComputer scienceOntology-based data integrationInformation systemSPARQLWeb Ontology Languagecomputer.file_formatData inputOntology (information science)computerDomain (software engineering)computer.programming_language
researchProduct

Library for model querying

2012

Query and transformation languages make it easy to work with models, but they are bound to one particular data store. That makes them hard to adopt in projects where data is stored in a different repository, which hinders more widespread use of transformations and models. Instead of adopting a transformation language to a new data store, we propose to build a query and transformation library for the general-purpose language that is already used in a project. In this paper we demonstrate that it can be easily by implementing such a library for an EMOF-like data store in the Lua language.

World Wide WebData storeTransformation (function)Work (electrical)Computer scienceData control languageQuery languagecomputerTransformation languageRDF query languagecomputer.programming_languageProceedings of the 12th Workshop on OCL and Textual Modelling
researchProduct

HTML - Hypertext Markup Language

1997

XHTMLRuleMLMarkup languageComputer sciencecomputer.file_formatHTMLSynchronized Multimedia Integration LanguageComputer Science ApplicationsWorld Wide WebSGMLcomputerInformation Systemscomputer.programming_languagePCDATACollaborative Application Markup LanguageInformatik-Spektrum
researchProduct

A novel policy-driven reversible anonymisation scheme for XML-based services

2015

Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…

XML Encryptioncomputer.internet_protocolComputer sciencePrivacy policyInternet privacyBig dataXACMLprivacyComputer securitycomputer.software_genreXACMLbig dataVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552XML-encryptioncomputer.programming_languagebusiness.industrydeanonymiserService-oriented architectureXML databaseHardware and Architecturebusinessreversible anonymisationcomputerSoftwareXMLInformation SystemsInformation Systems
researchProduct

Enforcing role based access control model with multimedia signatures.

2009

International audience; Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control languag…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer access controlComputer science[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer scienceXACMLAccess control02 engineering and technologycomputer.software_genreWorld Wide Web[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineeringRole-based access control[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Intelligent environmentcomputer.programming_language[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Ambient intelligenceMultimediabusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Computer security model[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]Web servicebusinesscomputerSoftware
researchProduct