Hadad, Graciela Dora Susana
The present thesis describes a Requirements Engineering strategy, called SDRES (Scenario Driven Requirements Engineering Strategy), which proposes to face topics rarely treated in real practice, such as continuous changes in requirements, software defects originated during requirements production, the organisational context surrounding the software system and the treatment of quality requirements.
The book deals with the topic of Operating Systems from and intuitive perspective and then delves into more technical concepts, which makes it appropriate for a first introductory course on the matter.
Rishiwal, Vinay; Yadav, Mano; Bajapai, S. K.; Verma, S.
Development of the efficient power aware protocol is the need of today s adhoc networks. Although developing battery efficient systems that have low cost and complexity, remains a crucial issue. In order to facilitate communication within a mobile adhoc network, an efficient routing protocol is required to discover routes between mobile nodes. Power is one of the most important design criteria for adhoc networks as batteries provide limited working capacity to the mobile nodes. Power failure of a mobile node not only affects the node itself but also its ability to forward packets on behalf of others and hence affects...
Isabona, Joseph; Ekpenyong, Moses E.; Akhirevbulu, Ojeabu
An accurate procedure for evaluating the strong correlation and conflicting goals of coverage, capacity and Quality of Service (QoS) is required for efficient planning of 3G radio networks. In this paper, we explore and implement an agent-based simulation methodology which allows for the fine-tuning of the input model parameters to study and evaluate the performance of Code Division Multiple Access (CDMA) systems. The results obtained are represented graphically to show scenarios for both uplink and downlink limited CDMA. The analysis is extended to demonstrate how Tower Mounted Amplifiers (TMA) can be used to benefit the uplink performance of a 1×...
Chen, Kai; Zhao, Le Jun
There s some very important meaning in the study of realtime face recognition and tracking system for the video monitoring and artifical vision. The current method is still very susceptible to the illumination condition, non-real time and very common to fail to track the target face especially when partly covered or moving fast. In this paper, we propose to use Boosted Cascade combined with skin model for face detection and then in order to recognize the candidate faces, they will be analyzed by the hybrid Wavelet, PCA (principle component analysis) and SVM (support vector machine) method. After that, Meanshift and...
Urriza, José M.; Schorb, Lucas; Orozco, Javier D.; Cayssials, Ricardo
Modern Real Time Operating Systems require reducing computational costs even though the microprocessors become more powerful each day. It is usual that Real Time Operating Systems for embedded systems have advance features to administrate the resources of the applications that they support. In order to guarantee either the schedulability of the system or the schedulability of a new task in a dynamic Real Time System, it is necessary to know the Worst Case Response Time of the Real Time tasks during runtime. In this paper a reduced computational cost algorithm is proposed to determine the Worst Case Response Time of...
Kelash, Hamdey M.; Koutb, Magdy M.; Abu Al Kahir, Mona M.
The very beginning of the research on Smart Adaptive Web Systems (SAWS). They are systems that adapt their response based on the context in which they are used. In AWS, three main sources of information have been identified are: user, environment, and technology. To design a site for adaptivity, the site s parts must be changeable according to users needs and interests. This paper represents a careful study of a large number of adaptive web systems which are used for adapting predesigned web pages and automatic synthesizing web pages. It suggests a new approach to extract the user s interest...
Wu, Rui-Qing; Cheng, Xi-Ran; Yang, Cun-Jian
This paper addresses the problem of contour line extraction from scanned topographic maps in poor condition. A novel method is developed, using knowledge of cartography and graphics to extract contours by removing other layers which overlay the contours, and reconstructing the contour lines. The contributions of this paper are the supplementation of the use of knowledge discovery for extraction on the scanned topographic maps.
Examples are presented from diverse applications to show that the developed algorithm can work effectively.
Avila Aoki, Manuel
A valid Calderbank-Shor-Steane (CSS) error correction code requires two classical linear codes for the preparation of the initial state (codewords). This code allow to correct for certain errors caused by an unwanted interaction which produces a degraded quantum state. However, this initial seven qubits encoding can be obtained from a maximally entangled Bell state (0000000>+|1111111)/√ through an operation Hint whose explicit expression is derived in the present work. The price the CSS syndrome has to pay due to its classical grounds is that the operator Hint is not unitary. In other words, Hint is not a valid quantum gate i....
Mezura-Montes, Efrén; Monterrosa-López, Carlos A.
The performance of two selection mechanisms used in the most popular variant of differential evolution, known as DE/rand/1/bin, are compared in the solution of constrained numerical optimization problems. Four performance measures proposed in the specialized literature are used to analyze the capabilities of each selection mechanism to reach the feasible region of the search space, to find the vicinity of the feasible global optimum and the computational cost (measured by the number of evaluations) required. Two parameters of the differential evolution algorithm are varied to determine the most convenient values.
A set of problems with different features is chosen to test...