Search results for "cryptography"

showing 10 items of 657 documents

Automatic Computation of Local Comfort Conditions in Buildings

2000

Publisher Summary A method for the automatic calculation of local comfort conditions in moderate indoor environment is been described in this chapter. It provides, among its output features, graphical maps of the PMV patterns. The program has been implemented on the commonly used operating system, and is characterized by a friendly usability, even by noncomputer expert users. The output of the code can be obtained not only in a graphical way but also in numerical formats. By using the program in conjunction with computer codes that provide the energy demand for climatization of buildings, it would be possible to evaluate the energy savings achieved in correspondence with the various adopted…

EngineeringSource codebusiness.industryComputationmedia_common.quotation_subjectDesign toolUsabilityCode (cryptography)Mean radiant temperaturebusinessEnergy (signal processing)SimulationEnvelope (motion)media_common
researchProduct

A RELIABILITY MODEL FOR OPTIMAL ALLOCATION OF SPARE TOOLS IN FMS

1989

ABSTRACT A model for the dynamic management of the tool set of an FMS workstation is developed. The proposed approach processing the on-line recorded tool failure data updates the estimate of the parameters of the probability density functions of tool life and selects, at the occurence of each failure, the code of the tool to be allocated in the workstation storage devices in order to maximize its reliability over a planned horizon.

EngineeringWorkstationbusiness.industryProbability density functionlaw.inventionReliability engineeringSet (abstract data type)lawSpare partCode (cryptography)Optimal allocationbusinessReliability modelReliability (statistics)
researchProduct

An energy and power based approach toward design of power split for urban hybrid vehicle

2011

This work presents a novel method of analyzing real and artificial urban driving cycles with regard to power and energy needs. The results can be used to facilitate the design of the power split between primary and secondary power sources for hybrid vehicles in urban applications. Based on the analysis of different real and artificial driving cycles three key values are defined that allow predefining the size of the primary and secondary power source.

Engineeringbusiness.industry05 social sciencesWork (physics)020302 automobile design & engineering02 engineering and technologyAC power7. Clean energyAutomotive engineering0506 political sciencePower (physics)Acceleration[SPI]Engineering Sciences [physics]0203 mechanical engineeringHybrid system11. Sustainability050602 political science & public administrationKey (cryptography)businessHybrid vehicleEnergy (signal processing)ComputingMilieux_MISCELLANEOUS
researchProduct

Intelligent Collaborative Platform for Testing a Product by Virtual Prototyping

2013

This paper presents an integrated platform, based on collaborative environment, which can improve the design and prototyping activities. Collaborative activities in supporting product development and design during all product life-cycle, needs a Digital Factory framework. Demonstration of prototyping in real-time where are available changes in geometry, constraints, or other parameters can be based on virtual and augmented platforms. The mechanical and non-mechanical design needs, or any other virtual experiment can be experimented in virtual laboratory where researchers located in different geographical zones, can work on the improvement of product, by sharing resources and research result…

Engineeringbusiness.industryHuman–computer interactionNew product developmentGeneral EngineeringKey (cryptography)Virtual LaboratoryStrategic managementProduct (category theory)businessInstructional simulationShared resourceVirtual prototypingAdvanced Materials Research
researchProduct

The Advantages of the Network-based Electronic Teaching Package by the Implementation of English for Specific Purposes Course

2015

Abstract The article analyses the advantages of English for Specific Purposes teaching of the fourth year students majoring in “Electrical and Power Engineering” at National Research Tomsk Polytechnic University by means of the network-based electronic teaching package. This paper analyzes the structural content of the network-based electronic teaching package, shows the key approaches used to develop this tool and focuses on the description of its main components. The conclusions made are based on the results obtained over a three year period (2012-2015) of the network-based electronic teaching package use.

Engineeringbusiness.industrykey approaches.English for specific purposesанглийский языкstructural contentEngineering managementComputer engineeringKey (cryptography)English for Specific PurposesComputingMilieux_COMPUTERSANDEDUCATIONэлектронное обучениеGeneral Materials SciencePower engineeringосновные подходыbusinessnetwork-based electronic teaching package
researchProduct

Charging Electric Vehicles Using Opportunistic Stopovers

2017

The diffusion of electric vehicles asks for efficient energy replenishment, which requires geographical and temporal coordination of shared charging resources. We introduce a novel charging methodology that exploits users’ opportunistic mobility. This paper focuses on vehicle stopovers detecting potential charg- ing opportunities. Our mobility-assisted methodology protects users privacy and permits a hybrid centralized/distributed ap- proach avoiding clashes with other potential users. A preliminary analysis on our charging system, obtained with mobility data from the field, shows that among the available charging stations, some are more relevant and have a key role in serving electric vehi…

Engineeringbusiness.product_categoryExploitbusiness.industrySettore ING-INF/03 - Telecomunicazioni020209 energyDistributed computingOnline charging system02 engineering and technologyelectric vehicle recharge stopover mobilityPreliminary analysisHardware_GENERALElectric vehicle0202 electrical engineering electronic engineering information engineeringKey (cryptography)businessTelecommunicationsEfficient energy use
researchProduct

An optimization location scheme for electric charging stations

2013

International audience; Due to environmental issues, electric mobility is one of the mobility alternatives that are receiving a huge attention nowadays. In fact, in the last few years electric vehicles have entered the world's car market. This revolutionary technology requires a fast deployment of electric charging stations since the key issue in this system is recharging the batteries. In this work, we propose an optimized algorithm to locate electric-vehicles charging stations. Different factors and limitations are considered and a real case study is given as an application. We first determine the appropriate strict constraints and cost of charging stations' location; and then we propose …

Engineeringbusiness.product_categorysmart-gridHeuristic (computer science)business.industryReal-time computingElectrical engineeringelectric vehicleCharging station[SPI]Engineering Sciences [physics]Smart gridplacement optimizationHardware_GENERALinvestment costElectric vehicleConvergence (routing)Genetic algorithmKey (cryptography)Dendrogramgenetic algorithmcharging stationbusinessPremature convergencecapacity constraint
researchProduct

Cyber Security for Wireless Semantic (SCADA/DCS) Systems

2016

International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …

Engineeringcomputer.internet_protocolSOAP0211 other engineering and technologies[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Supervisory controlSecure communicationSCADAWireless Application ProtocolSemantic Wireless (SCADA/DCS)Wireless Security ProtocolProtocol (object-oriented programming)Semantic Cyber Security[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]021110 strategic defence & security studiesbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS021001 nanoscience & nanotechnology(ZIGBEE/SOAP/SECURITY) ProtocolControl and Systems EngineeringKey (cryptography)0210 nano-technologyDistributed control systembusinessSmart Energetic PlatformcomputerComputer network
researchProduct

In Search of Evidence for Model-Driven Development Claims: An Experiment on Quality, Effort, Productivity and Satisfaction

2015

Context: Model-Driven Development (MDD) is a paradigm that prescribes building conceptual models that abstractly represent the system and generating code from these models through transformation rules. The literature is rife with claims about the benefits of MDD, but they are hardly supported by evidences. Objective: This experimental investigation aims to verify some of the most cited benefits of MDD. Method: We run an experiment on a small set of classes using student subjects to compare the quality, effort, productivity and satisfaction of traditional development and MDD. The experiment participants built two web applications from scratch, one where the developers implement the code by h…

Engineeringmedia_common.quotation_subjectContext (language use)computer.software_genreSoftware_SOFTWAREENGINEERINGCode (cryptography)Automatic programmingWeb applicationQuality (business)Programming paradigmsProductivityQuality analysis and evaluationmedia_commonbusiness.industryData scienceComputer Science ApplicationsProgramming paradigmConceptual modelData miningMethodologiesbusinessAutomatic programmingcomputerLENGUAJES Y SISTEMAS INFORMATICOSSoftwareInformation Systems
researchProduct

Using human-values as a guide for understanding worthy design directions in augmented reality

2016

Augmented reality is a fast developing field, which will no doubt gain strong footing in the area of social media in the near future. Recently, Google Glass placed AR towards the top of the technological hype curve in regards to interaction possibilities, information overlay, information search and recording. Questions still remain however, regarding the added-value that AR offers to already existing interaction modes and technologies. In this study four concepts were designed and tested via video scenarios. The concepts related to three main product categories: educational tools; information presentation; and x-ray vision. The results positively reflected on the application of AR for educa…

Engineeringmedia_common.quotation_subjectdesignHuman valuesField (computer science)Human–computer interactionvalues0501 psychology and cognitive sciencesSocial medialisätty todellisuus050107 human factorsmedia_commoninhimilliset tekijätta113Distrustbusiness.industry05 social sciencesscenarios050301 educationskenaariotaugmented realityKey (cryptography)Augmented realitybusinessInformation presentationlife-based design0503 educationhuman factors
researchProduct