62 results on '"design strategy"'
Search Results
2. Green BIM-based study on the green performance of university buildings in northern China
- Author
-
Liu, Qibo and Wang, Zixin
- Published
- 2022
- Full Text
- View/download PDF
3. The ABCs of Designing Social Networks for Health Behaviour Change: The VivoSpace Social Network
- Author
-
Kamal, Noreen, Fels, Sidney, Blackstock, Mike, Ho, Kendall, and Kranakis, Evangelos, editor
- Published
- 2013
- Full Text
- View/download PDF
4. The Seismic Analysis and Design Countermeasures on the Stair Treads of the Folded Plate Staircase in Reinforced Concrete Frame Structure
- Author
-
Shilong, He, Jirong, Song, and Zhang, Tianbiao, editor
- Published
- 2012
- Full Text
- View/download PDF
5. Codes in the Clouds Observing New Design Strategies
- Author
-
Werner, Liss C., Gengnagel, Christoph, editor, Kilian, Axel, editor, Palz, Norbert, editor, and Scheurer, Fabian, editor
- Published
- 2012
- Full Text
- View/download PDF
6. From Structural Analysis to Scenarios and Patterns for Knowledge Sharing Applications
- Author
-
Kaelber, Claus, Märtin, Christian, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, and Jacko, Julie A., editor
- Published
- 2011
- Full Text
- View/download PDF
7. Studies on Sustainable Design Strategies of the Product-Service System for the Web-Based English Learning
- Author
-
Qiu, Yue, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Luo, Xiangfeng, editor, Spaniol, Marc, editor, Wang, Lizhe, editor, Li, Qing, editor, Nejdl, Wolfgang, editor, and Zhang, Wu, editor
- Published
- 2010
- Full Text
- View/download PDF
8. The Grindahl Hash Functions
- Author
-
Knudsen, Lars R., Rechberger, Christian, Thomsen, Søren S., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Biryukov, Alex, editor
- Published
- 2007
- Full Text
- View/download PDF
9. The Practices of Scenario Observation Approach in Defining Medical Tablet PC Applications
- Author
-
Peng, Chien Yu, Kao, Wei Shin, Liang, You Zhao, Chiou, Wen Ko, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Jacko, Julie A., editor
- Published
- 2007
- Full Text
- View/download PDF
10. A Component Class for Design Objects
- Author
-
Rogier, Jan, Hewitt, W. T., editor, Gnatz, R., editor, Duce, D. A., editor, ten Hagen, Paul J. W., editor, and Veerkamp, Paul J., editor
- Published
- 1991
- Full Text
- View/download PDF
11. An Efficient and Automated Design Strategy for Multiphysics E-Motor Development
- Author
-
Torben Schulze, Jean-Baptiste Mouillet, Thomas Lehmann, and Lars Fredriksson
- Subjects
Electromagnetics ,Process (engineering) ,business.industry ,Computer science ,Multiphysics ,Systems engineering ,Noise, vibration, and harshness ,Design process ,Design strategy ,business ,Engineering design process ,Automation - Abstract
Standard design processes for e-motors foresee siloed development of different attributes depending on nature and type of requirements. Thus, electromagnetic, thermal, mechanical and NVH attributes are developed individually which leads to unfavorable compromises and/or late costly firefighting. Mercedes-AMG GmbH are developing high-performance e-motors that deliver maximum performance under severe driving conditions. This requires high attention to durability and thermal effects and although serving high-performance cars, the motors must fulfill highest NVH standards. Altair Engineering has introduced Simulation-Driven Design (SDD) to support holistic, multiphysics development of e-motors. SDD processes are introduced to enhance classical development by accounting for essential development requirements simultaneously using optimization and by continuously providing a maximum of information to support the design process. This paper introduces a pilot application of a unique, highly automatic, multiphysics design process for e-motors, based on a current e-motor program at AMG. The process is developed to consider essential development requirements including electromagnetics and thermal requirements, NVH, stress and durability. It accommodates for DOE, multi-objective optimization and design exploration methods to be used to explore and find feasible motor designs. The paper will show how the strategy adds efficiency to the e-motor development process and how it can impact the total costs of development. The uniqueness of this development lies in the automation of the multiphysics design process and the creation of an environment to democratize multiphysics design optimization within the e-motor design departments.
- Published
- 2021
- Full Text
- View/download PDF
12. Theoretical design of novel energetic salts derived from bicyclo-HMX
- Author
-
Zhang, Cong, Zhao, Feng-Qi, Xu, Si-Yu, and Ju, Xue-Hai
- Published
- 2018
- Full Text
- View/download PDF
13. Design Strategies for ARX with Provable Bounds: Sparx and LAX
- Author
-
Aleksei Udovenko, Léo Perrin, Alex Biryukov, Johann Großschädl, Vesselin Velichkov, and Daniel Dinu
- Subjects
Differential cryptanalysis ,Open problem ,02 engineering and technology ,Design strategy ,Higher-order differential cryptanalysis ,020202 computer hardware & architecture ,Piling-up lemma ,Cipher ,Linear cryptanalysis ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Algorithm ,Mathematics ,Block cipher - Abstract
We present, for the first time, a general strategy for designing ARX symmetric-key primitives with provable resistance against single-trail differential and linear cryptanalysis. The latter has been a long standing open problem in the area of ARX design. The wide-trail design strategy (WTS), that is at the basis of many S-box based ciphers, including the AES, is not suitable for ARX designs due to the lack of S-boxes in the latter. In this paper we address the mentioned limitation by proposing the long trail design strategy (LTS) – a dual of the WTS that is applicable (but not limited) to ARX constructions. In contrast to the WTS, that prescribes the use of small and efficient S-boxes at the expense of heavy linear layers with strong mixing properties, the LTS advocates the use of large (ARX-based) S-Boxes together with sparse linear layers. With the help of the so-called long-trail argument, a designer can bound the maximum differential and linear probabilities for any number of rounds of a cipher built according to the LTS.
- Published
- 2016
- Full Text
- View/download PDF
14. Design for Pride in the Workplace
- Author
-
Lu, Yichen and Roto, Virpi
- Published
- 2016
- Full Text
- View/download PDF
15. Learning in the Smart City: A Virtual and Augmented Museum Devoted to Chaos Theory
- Author
-
Pietro Pantano, Manuela Carini, Lorella Gabriele, Eleonora Bilotta, Assunta Tavernise, and Francesca Bertacchini
- Subjects
Exhibition ,CHAOS (operating system) ,Multimedia ,Dynamical systems theory ,Human–computer interaction ,Computer science ,Order (business) ,Public participation ,Smart city ,Design strategy ,computer.software_genre ,computer ,Chaos theory - Abstract
This paper presents a virtual museum introducing the interactive VR and MEMS applications related to the learning of chaos and complexity theory. In this museum, the user can learn the history of the dynamical systems and how to build Chua's circuit, as well as realize artistic artifacts transforming attractors into sounds and music. This environment can be used in the city in order to create new ways of experiencing science, turning physical activities into virtual ones, an important step towards being able to have the museum in the smart city. Moreover, some applications have been developed to work on iPad and iPhone and can be used as a guide in the real exhibitions. A user-centred design strategy with 40 students has been carried out in order to implement the Virtual Museum of Chua's Attractors, aiming at widening the experience in the smart city and allowing a considerable public participation.
- Published
- 2014
- Full Text
- View/download PDF
16. The Optimization Design Strategy of Xizhimen Underground Commercial Space Based on Post-Occupancy Evaluation
- Author
-
Linlin Qian, Linlin Guo, and Haishan Xia
- Subjects
Engineering ,Process (engineering) ,business.industry ,Rail transit ,Design strategy ,Space (commercial competition) ,Post-occupancy evaluation ,GeneralLiterature_MISCELLANEOUS ,Construction engineering ,ComputingMilieux_COMPUTERSANDSOCIETY ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,business ,Design methods ,Underground space - Abstract
The construction of underground commercial streets and underground business complexes has become a trend for development and utilization of underground space as the development of China’s urbanization process and the construction of the underground rail transit accelerated. Due to the relative limitations of the design methods or design concept when architectures and the environments were built, the introduction of architectural and environmental post-occupancy evaluation (POE) becomes the trend of the underground space construction. This paper explore the development status of the underground commercial space as well as the qualitative and quantitative research indicators analysis by applying the POE method in the current situation of Xizhimen station’s underground commercial space. Thus Xizhimen underground commercial space of optimization strategies was proposed in order to promote the development of underground space and utilization.
- Published
- 2013
- Full Text
- View/download PDF
17. Assessing the Relationship between New Product Development Practices and Performance in the Norwegian Manufacturing Industry
- Author
-
Geir Ringen, Silje Helene Aschehoug, and Torgeir Welo
- Subjects
Engineering ,Process management ,business.industry ,media_common.quotation_subject ,Sample (statistics) ,Workload ,Design strategy ,Manufacturing ,New product development ,Loyalty ,Portfolio ,Lean product development ,Operations management ,business ,media_common - Abstract
This article reports on a survey for determining the current status of lean product development (LPD) practices among Norwegian manufacturing companies using a generic LPD model as basis. The model includes six main dimensions and was developed based on a systematic review of existing models, practices and interpretations, including the Toyota Product Development Systems amongst others. Using non-probabilistic design, a sample of 258 responses out of 356 invited subjects, demonstrates the relation between product development performance and the following elements: clear project prioritization based on portfolio thinking and balancing the workload; loyalty to the agreed upon design strategy; project dynamics cause project members to continuously update themselves on critical product characteristics; and the use of simple and visual communication modes is deployed in the organization.
- Published
- 2013
- Full Text
- View/download PDF
18. Research on Co-simulation Method in ADAMS and MATLAB for Missile Seeker’s Stabilization Platform Design
- Author
-
Zhengchun Liu, Jun Yang, and Xueping Zhu
- Subjects
Engineering ,business.industry ,media_common.quotation_subject ,Control engineering ,Design strategy ,Co-simulation ,Missile ,Debugging ,Control system ,Isolation (database systems) ,MATLAB ,business ,computer ,Simulation ,computer.programming_language ,media_common ,Block (data storage) - Abstract
Missile seeker’s stabilization platform, also called coordinator was one of the key parts of seeker. In this study, an ADAMS/Matlab co-simulation environment for the design of seeker’s stabilization platform was proposed. First, the mechanical model of coordinator is analyzed, virtual prototype model of the coordinator was built through SolidWorks and ADAMS, and the control model of the coordinator was built through MATLAB and Simulink toolbox. Then co-simulation model was achieved through ADAMS/Control block and Matlab/Simulink port. At last, model accuracy was verified by using coordinator’s real data. With all of these, control system of the coordinator was designed in the co-simulation environment, and isolation performance of the coordinator was tested in this co-simulations environment. Simulation results show that the coordinator’s design work based on the ADAMS/Matlab co-simulation environment is feasible, effective and practical, and it has advantages such as higher fidelity of controlled objective, easier for modeling and debugging compared with traditional design strategy of mathematical methods, and provided a new design approach for high performance coordinator.
- Published
- 2013
- Full Text
- View/download PDF
19. Design Strategy for the Bottom of the Pyramid
- Author
-
Deepa Prahalad
- Subjects
Poverty ,Bottom of the pyramid ,Multinational corporation ,Price point ,Relevance (information retrieval) ,Design strategy ,Business ,Business model ,Industrial organization ,Term (time) - Abstract
The (Bottom of the Pyramid) BOP was a term referring to the roughly four billion people around the world who live on less than $2/day in PPP terms and remain largely invisible to MNCs as consumers. There are several premises to the BOP theory. The first is that for-profit models are a necessary tool in alleviating poverty and more sustainable than aid. Second, the innovations needed to serve the poor profitably have the potential to make firms more competitive while accelerating economic development. Third, engaging the BOP as consumers demands that companies understand the real needs and aspirations of the poor, build trust and collaborate with them (and often NGOs) as partners. Fourth, many successful innovations for the BOP will have global relevance (Prahalad, BOP).
- Published
- 2013
- Full Text
- View/download PDF
20. AMASIVE: An Adaptable and Modular Autonomous Side-Channel Vulnerability Evaluation Framework
- Author
-
Marc Stöttinger, Sorin A. Huss, and Michael Zohner
- Subjects
Attack model ,Computer science ,business.industry ,Cryptography ,Integrated circuit design ,Design strategy ,Side channel attack ,Modular design ,Software engineering ,business ,Computer-aided engineering ,Block cipher - Abstract
Over the last decades computer aided engineering (CAE) tools have been developed and improved in order to ensure a short time-to-market in the chip design business. Up to now, these design tools do not yet support a design strategy for the development of side-channel resistant hardware implementations. In this chapter we introduce a novel engineering framework named AMASIVE (Adaptable Modular Autonomous SIde-Channel Vulnerability Evaluator), which supports the designer in implementing side-channel hardened devices. An attacker model is introduced for the analysis and the evaluation of a given cryptographic design in regard to application-specific vulnerabilities and exploitations. We demonstrate its application to a hardware implementation of the block cipher PRESENT.
- Published
- 2013
- Full Text
- View/download PDF
21. 'Nobody Other Than Me Knows What I Want': Customizing a Sports Watch
- Author
-
Piia Nurkka
- Subjects
World Wide Web ,User experience design ,business.industry ,Computer science ,Order (business) ,Control (management) ,Context (language use) ,Design strategy ,Product (category theory) ,business ,nobody ,Personalization - Abstract
In order for companies to effectively use customization as a design strategy, there should be understanding on what users would like to customize and why. This study explores the use of customization features of sports watch in order to assess the extent of customization, and to identify reasons for customization in this context. Survey data from 100 users of a sports watch were analyzed to understand how they use the different customization features: general preferences, functionality and appearance. The findings show that although the users vary in the use of customization, they state similar reasons for customization: control, ease-of-use, increased effectiveness, and better fit to personal preferences. The motivation to customize in this context is for the most part related to autonomy: to the sense of control the user has by having the tool to adapt the product according to own preferences, wants and needs.
- Published
- 2013
- Full Text
- View/download PDF
22. Who Cares About Software Process Modelling? A First Investigation About the Perceived Value of Process Engineering and Process Consumption
- Author
-
Alexander Knapp, Daniel Méndez Fernández, and Marco Kuhrmann
- Subjects
Software development process ,Value (ethics) ,Consumption (economics) ,Engineering ,Risk analysis (engineering) ,Management science ,business.industry ,Process (engineering) ,Selection (linguistics) ,Design strategy ,Action research ,business - Abstract
When it comes to designing a software process, we have experienced two major strategies. Process engineers can either opt for the strategy in which they focus on designing a process using an artefact model as backbone or, on the other hand, they can design it around activities and methods. So far, we have first studies that directly analyse benefits and shortcomings of both approaches in direct comparison to each other, without addressing the questions relevant to process engineers and which implications the selection of a particular design strategy has on the process consumption. We contribute a first controlled investigation on the perceived value of both strategies from the perspectives of process engineers and process consumers. While our results underpin the artefact-oriented design strategy to be an advantageous instrument for process engineers, process consumers do not evidently care about the selected design strategy. Furthermore, our first investigation performed in an academic environment provides a suitable empirical basis, which we can use to steer further replications and investigations in practical environments.
- Published
- 2013
- Full Text
- View/download PDF
23. A Quantitative Evaluation of the Impact of Architectural Patterns on Quality Requirements
- Author
-
Mohamad Kassab, Hafedh Mili, and Ghizlane El-Boussaidi
- Subjects
business.industry ,Computer science ,Process (engineering) ,media_common.quotation_subject ,Design strategy ,Multiple-criteria decision analysis ,Software ,Architectural pattern ,High-level design ,Quality (business) ,Software engineering ,business ,Software architecture ,media_common - Abstract
When designing software architectures, an architect relies on a set of pre-defined styles commonly named architectural patterns. While architectural patterns embody high level design decisions, an architectural tactic is a design strategy that addresses a particular quality attribute. Tactics; in fact, serve as the meeting point between the quality attributes and the software architecture. To guide the architect in selecting the most appropriate architectural patterns and tactics, the interactions between quality attributes, tactics and patterns should be analyzed and quantified and the results should be considered as decision criteria within a quality-driven architectural design process. In this paper, we propose an approach for a quantitative evaluation of the support provided by a pattern for a given targeted set of quality attributes.
- Published
- 2012
- Full Text
- View/download PDF
24. Research on Passive Low Carbon Design Strategy of Highway Station in Hunan
- Author
-
Lei Shi, Mingjing Xie, Zhang Ying, and Luobao Ge
- Subjects
Geography ,Environmental engineering ,Building energy ,Natural ventilation ,Passive solar building design ,Design strategy ,Shading ,Skylight ,Civil engineering - Abstract
This paper analyzed public building energy consumption and climate characteristics in Hunan province. It is proposed that passive LC (low carbon) design of highway station in Hunan province should focus on both natural daylighting, shading and natural ventilation. Based on the different design strategies, including daylighting, shading and natural ventilation, it is proposed that passive LC technology strategies, such as atrium, skylight combining the natural ventilation, caused by thermal pressure, should be used in order to reduce the emission of highway station in Hunan area.
- Published
- 2012
- Full Text
- View/download PDF
25. Design Strategy of Smart Phone-Based Diabetic Patient Management System
- Author
-
Youngseok Lee, Soonkwan Hong, and MyungWoo Nam
- Subjects
Telemedicine ,Multimedia ,Computer science ,business.industry ,Design strategy ,Communications system ,computer.software_genre ,Software ,Management system ,Software design ,Wireless ,The Internet ,business ,computer - Abstract
With the advent of the internet and wireless technology, a worldwide communication system is available enabling people to communicate at anytime and anywhere and to exchange information online. Telemedicine systems have been proposed for nearly two decades as a means of supporting patients with chronic medical diseases such as diabetes and high blood pressure. In this paper we propose a strategic approach method for diabetic patient management system based on smart phone. The proposed method is categorized into three categories which are a hardware design, a software design and a social network service. At the strategy of a hardware design, we focus on the convenient use of a diabetes measurement system, so the data communication between a smart phone and a diabetes measurement system must be a wireless and we also focus on the patient- customizing software at the software design strategy. And the bidirectional clinical data communication between a patient and a hospital must be a real-time by the social network service.
- Published
- 2012
- Full Text
- View/download PDF
26. Fundamentals of Designing Complex Aerospace Software Systems
- Author
-
Emil Vassev, Mike Hinchey, and SFI
- Subjects
business.industry ,Computer science ,Reliability (computer networking) ,Design strategy ,software design ,Task (project management) ,aerospace systems ,Software ,Software construction ,Systems engineering ,Software design ,Software system ,complexity ,autonomic systems ,Software engineering ,business ,Aerospace - Abstract
peer-reviewed Contemporary aerospace systems are complex conglomerates of components where control software drives rigid hardware to aid such systems meet their standards and safety requirements. The design and development of such systems is an inherently complex task where complex hardware and sophisticated software must exhibit adequate reliability and thus, they need to be carefully designed and thoroughly checked and tested. We discuss some of the best practices in designing complex aerospace systems. Ideally, these practices might be used to form a design strategy directing designers and developers in finding the ???right design concept??? that can be applied to design a reliable aerospace system meeting important safety requirements. Moreover, the design aspects of a new class of aerospace systems termed ???autonomic??? is briefly discussed as well.
- Published
- 2012
- Full Text
- View/download PDF
27. The ABCs of Designing Social Networks for Health Behaviour Change: The VivoSpace Social Network
- Author
-
Noreen Kamal, Sidney Fels, Kendall Ho, and Mike Blackstock
- Subjects
Knowledge management ,Social network ,Conceptual framework ,business.industry ,Appeal ,Theoretical models ,Health behaviour ,Questionnaire ,Sociology ,Design strategy ,Social determinants of health ,business ,Social psychology - Abstract
This chapter presents the Appeal, Belonging, Commitment (ABC) conceptual framework, which describes how online social networks can be designed to motivate positive health behaviour change. The ABC Framework is based on the existing theoretical models that describe the determinants for motivating the use of online social networks and health behaviour change. Common themes are drawn from these theoretical models and combined to provide the determinants for the three emergent themes: Appeal (individual determinants), Belonging (social determinants) and Commitment (temporal determinants). Results from a questionnaire survey and interviews are presented to validate and iterate the ABC Framework. Based on these themes and their determinants, design suggestions are presented. A case study implementation of the ABC Framework is shown through the design of VivoSpace. The design strategies are interpreted to design the online social health system, VivoSpace, and the ABC Framework is used to evaluate the design. This case study shows that the ABC Framework provides the best methodology to design and evaluate an online social network that will lead to a committed user base and motivate health behaviour change.
- Published
- 2012
- Full Text
- View/download PDF
28. The Seismic Analysis and Design Countermeasures on the Stair Treads of the Folded Plate Staircase in Reinforced Concrete Frame Structure
- Author
-
He Shilong and Song Jirong
- Subjects
Engineering ,business.industry ,Spatial model ,Frame (networking) ,Structure (category theory) ,Design strategy ,Structural engineering ,Tread ,Reinforced concrete ,business ,Finite element method ,Seismic analysis - Abstract
This paper, combining with the "5.12" Wenchuan earthquake damage data, analysis the destruction and the cause of the destruction of the frame structure folded plate staircase stair tread in the earthquake. And on this basis, this paper, taking a 5-layer framework structure office building as example and using the PMSAP finite element analysis software, establishes the spatial model with a folded plate stair components included and does the quantitative analysis, which in the end results in the variation of internal forces of the variety of stair treads under earthquake size and the changing law, and then the traditional model results is compared with the new data. Finally, this paper comes up with the design strategies for new construction and the repair and reinforcement of the reinforced concrete frame structure folded plate stair frame in the future.
- Published
- 2011
- Full Text
- View/download PDF
29. The Implementing and Researching of BIT in Airborne Computer
- Author
-
Xinyu Tian, Xiaolin Zhang, Ying Yao, and Haitao Wu
- Subjects
Engineering ,Cover (telecommunications) ,business.industry ,Reliability (computer networking) ,Electrical engineering ,Maintainability ,Serial port ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Design strategy ,Constant false alarm rate ,Bit (horse) ,Key (cryptography) ,business ,Computer hardware - Abstract
BIT (Built - in Test) is an important ways to improve the performance of testing and maintenance in the airborn computer. But the widespread use of BIT is hindered by the high false alarm rate. A new BIT design strategy and arithmetic for airborn computer is proposed in this paper to reduce the false alarm rate. And some BIT solutions of key technologies in airborn computer are given in this paper, such as digital I/O channels, A/D channels, D/A channels and serial interface. It is proved by practice that the BIT design strategy proposed in this paper can improve the test cover rate to 90%, reduce the false alarm rate to 35%, make the reliability and maintainability of the airborn computer increasing obviously.
- Published
- 2011
- Full Text
- View/download PDF
30. Codes in the Clouds Observing New Design Strategies
- Author
-
Liss C. Werner
- Subjects
Architectural pattern ,Computer science ,Scripting language ,Management science ,Identity (object-oriented programming) ,Design strategy ,Architecture ,computer.software_genre ,Digital architecture ,computer ,Data science ,Space syntax ,Through-the-lens metering - Abstract
Looking at architecture through the lens of currently emerging, advanced architectural design tools, strategies and techniques in the 21 st century are as questionable as looking through the lens of a 2-dimensional Rapidograph drawing. Architecture is neither determined by complex geometries digitally established through scripting, nor by the one dimensional perception through a hard line drawing. The role of architecture is currently being challenged through almost overwhelming advanced digital techniques merged with traditional strategies in order to find its new identity within a post-mechanical towards a biological computing age of construction. We are seemingly fooled by the understanding that we do conquer the boundaries of geometry and form production. The paper discusses the connection point of advanced digital architecture as tool to complement and bring forward professionally and culturally established parameters, such as material tectonics, perception or architectural pattern.
- Published
- 2011
- Full Text
- View/download PDF
31. From Structural Analysis to Scenarios and Patterns for Knowledge Sharing Applications
- Author
-
Claus Kaelber and Christian Märtin
- Subjects
Knowledge management ,Knowledge extraction ,Computer science ,business.industry ,Structural pattern ,Behavioral pattern ,Domain knowledge ,Design strategy ,User interface ,business ,Data science ,Knowledge sharing - Abstract
In this paper we present a pragmatic development approach for knowledge sharing applications that encompasses both design and software engineering aspects. It starts from scenarios and leads to patterns that help application developers and user interface designers on the one hand to separate relevant content from unimportant data and on the other hand propose techniques for qualitatively structuring knowledge management and knowledge sharing tasks for enterprises and individuals.
- Published
- 2011
- Full Text
- View/download PDF
32. Optimisation of Integrated Low-Carbon Energy Strategies: A Case Study for ‘Zero Carbon’ Social Housing in the UK
- Author
-
Paul Rowley and Li Mei
- Subjects
Engineering ,Waste management ,business.industry ,Fossil fuel ,chemistry.chemical_element ,Design strategy ,Solar energy ,Civil engineering ,Glazing ,chemistry ,Storage tank ,Thermal ,business ,Carbon ,Energy (signal processing) - Abstract
This paper details the modelling and prediction of the solar energy supply available for hot water and space heating in a domestic house designed to ‘zero carbon’ standards in the UK Midlands. The design strategy for the dwelling includes a highly insulated timber frame fabric with a south-facing full-height sunspace and ‘low-U’ glazing to optimise natural lighting and solar energy gain over the year. A solar thermal system installation is intended to further reduce fossil energy consumption. In conjunction with post-occupancy evaluation, a computational whole-building model with sub-systems has been configured to represent and evaluate in detail the integrated system energy performance including domestic hot water and space heating requirements.
- Published
- 2011
- Full Text
- View/download PDF
33. An E-Class Teaching Management System (ECTMS): Strategy and Application
- Author
-
Harrison Hao Yang, Xiaojuan Li, Defeng Lin, and Pinde Chen
- Subjects
Class (computer programming) ,Multimedia ,business.industry ,Process (engineering) ,Computer science ,Teaching method ,Design strategy ,computer.software_genre ,Software ,Pedagogy ,Synchronization (computer science) ,Management system ,ComputingMilieux_COMPUTERSANDEDUCATION ,business ,computer ,Curriculum - Abstract
This paper presents an e-class teaching management system (ECTMS), which is a software supporting the synchronization of classroom teaching and learning activities. The system looks upon a class as a sequence of e-teaching-events. By controlling the operation of the e-teaching-events, the teacher monitors and manages the process of teaching. This paper describes the design strategy, architecture and typical application mode of ECTMS, and then provides a case study of applying this system in a real-world classroom. The survey results show that the teacher is satisfied with the concepts of ECTMS and agrees with that ECTMS has many advantages for the classes in which there are many exercises and curriculum evaluation processes.
- Published
- 2010
- Full Text
- View/download PDF
34. Evolutionary Analog IC Design Optimization
- Author
-
Jorge Guilherme, Nuno Horta, and Manuel Barros
- Subjects
Mathematical optimization ,Fitness function ,Computer science ,Genetic algorithm ,Evolutionary algorithm ,Design strategy ,Integrated circuit design ,Multi-objective optimization ,Evolutionary computation ,Nonlinear programming - Abstract
This chapter starts with an overview on computation techniques aiming to solve nonlinear optimization problems with emphasis on evolutionary optimization algorithms and discusses their relevance to analog design problem. The main virtues and weaknesses, as well as, the design issues of evolutionary algorithms are discussed with a description of the recent developments in this field. This chapter also introduces a new optimization kernel based on genetic algorithms applied to analog circuit optimization. It includes a detailed description of the coding schemes, the fitness function, the genetic operators and other design strategy criteria. Finally, a robust IC design methodology supported by the optimization kernel is presented in the end of the chapter.
- Published
- 2010
- Full Text
- View/download PDF
35. Building Secure Block Ciphers on Generic Attacks Assumptions
- Author
-
Jacques Patarin and Yannick Seurin
- Subjects
Provable security ,Theoretical computer science ,Cryptographic primitive ,Design strategy ,Adversary ,Computer security ,computer.software_genre ,USable ,computer ,Avalanche effect ,Mathematics ,Key size ,Block cipher - Abstract
Up to now, the design of block ciphers has been mainly driven by heuristic arguments, and little theory is known to constitute a good guideline for the development of their architecture. Trying to remedy this situation, we introduce a new type of design for symmetric cryptographic primitives with high self-similarity. Our design strategy enables to give a reductionist security proof for the primitive based on plausible assumptions regarding the complexity of the best distinguishing attacks on random Feistel schemes or other ideal constructions. Under these assumptions, the cryptographic primitives we obtain are perfectly secure against any adversary with computational resources less than a given bound. By opposition, other provably secure symmetric primitives, as for example C [3] and KFC [4], designed using information-theoretic results, are only proved to resist a limited (though significant) range of attacks. Our construction strategy leads to a large expanded key size, though still usable in practice (around 1 MB).
- Published
- 2009
- Full Text
- View/download PDF
36. Web User Interface Design Strategy: Designing for Device Independence
- Author
-
Ioannis Basdekis, Constantine Stephanidis, and Panagiotis Karampelas
- Subjects
QA75 ,medicine.medical_specialty ,Multimedia ,Computer science ,Shell (computing) ,Design strategy ,computer.software_genre ,User interface design ,Human–computer interaction ,Web design ,medicine ,Web navigation ,Web service ,User interface ,computer ,Web modeling - Abstract
Until recently, Web services were available only through a desktop web browser. Nowadays, methods of access move beyond the desktop computer towards ubiquitous access through portable devices. As a consequence, users have the chance to interact with a growing diversity of computing devices such as PDAs, smart phones, etc., with diverse characteristics that tend to replace conventional laptop and desktop computers. User interface designers, on the other hand, strive to design usable interfaces to cater for the diverse requirements of these devices. The design strategy proposed in this paper aims at assisting user interface designers in designing for diverse devices recommending a specific line of activities in the process of design. A case study of application of the proposed design strategy is presented, outlining its advantages.
- Published
- 2009
- Full Text
- View/download PDF
37. Development of Design Strategy for RBF Neural Network with the Aid of Context-Based FCM
- Author
-
Ho-Sung Park, Sung-Kwun Oh, and Hyun-Ki Kim
- Subjects
Training set ,Artificial neural network ,Computer science ,business.industry ,Context (language use) ,Design strategy ,Machine learning ,computer.software_genre ,Fuzzy logic ,Radial basis function ,Data mining ,Artificial intelligence ,Cluster analysis ,business ,computer - Abstract
In this paper, we develop a new design strategy of Radial Basis Function (RBF) neural network and provide a comprehensive design methodology and algorithmic setup supporting its development. The architecture of the network is fully reflective of the structure encountered in the training data which are granulated with the aid of clustering techniques. More specifically, the output space is granulated with use of FCM clustering while the information granules in the multidimensional input space are formed by using a so-called context-based Fuzzy C-Means which takes into account the structure being already formed in the output space. A series of numeric studies exploiting synthetic data and data from the Machine Learning Repository provide a detailed insight into the nature of the algorithm and its parameters as well as offer some comparative analysis.
- Published
- 2009
- Full Text
- View/download PDF
38. Literature Review of Technologies and Energy Feedback Measures Impacting on the Reduction of Building Energy Consumption
- Author
-
Eun-Ju Lee, Jae Min Kim, Min-Ho Pae, Dong Ho Kim, and Jong-Yeob Kim
- Subjects
Reduction (complexity) ,Consumption (economics) ,Engineering ,Order (exchange) ,business.industry ,Energy (esotericism) ,Information system ,Operations management ,Energy consumption ,Design strategy ,Environmental economics ,business ,Energy engineering - Abstract
In order to reduce energy consumption in buildings, there are a number of available technologies and measures that can be adopted. Energy feedback measures enable energy end-users (e.g. households) to recognize the need for energy reduction and change their behaviour accordingly. The effects of energy feedback measures have been reported on in most North American and European industrialized countries, though little research has been conducted in Korea. This paper presents case studies of energy feedback measures and their effectiveness on the basis of a literature review of academic papers, technical reports and website sources. Energy feedback measures can be as effective (10-20% reduction rate) as innovative energy systems which require substantial capital investment. In this paper, the design strategy of universal human interfaces is also discussed in support of energy feedback measures.
- Published
- 2008
- Full Text
- View/download PDF
39. DPSKEL: A Skeleton Based Tool for Parallel Dynamic Programming
- Author
-
Ignacio Peláez, Fernando Suárez, and Francisco Almeida
- Subjects
Dynamic programming ,Set (abstract data type) ,Theoretical computer science ,Computer science ,Programming language ,Component-based software engineering ,Parallelism (grammar) ,Distributed memory ,Design strategy ,Algorithmic skeleton ,Skeleton (category theory) ,computer.software_genre ,computer - Abstract
Skeleton based libraries are considered one of the alternatives to reduce the distance between end users and parallel architectures. Algorithmic skeletons are based in general procedures describing the method to be implemented. Although a gap between general formalizations for dynamic programming and software components can be found, we develop a skeleton tool for dynamic programming problems. The design strategy is general enough to consider a wide rage of dynamic programming recurrences. As usual in skeleton approaches, the parallelism is provided in a transparent manner, so that, sequential users may access to the system. A set of tests problems representative of different classes of dynamic programming formulations has been used to validate the distributed memory implementation on an IBM-SP.
- Published
- 2008
- Full Text
- View/download PDF
40. Service Choreography and Orchestration with Conversations
- Author
-
Tevfik Bultan
- Subjects
Computer science ,computer.internet_protocol ,business.industry ,Service choreography ,Design strategy ,Service-oriented architecture ,Single party ,Business Process Execution Language ,World Wide Web ,Asynchronous communication ,The Internet ,business ,computer ,Implementation - Abstract
Service oriented computing provides technologies that enable multiple organizations to integrate their businesses over the Internet. Typical execution behavior in this type of distributed systems involves a set of autonomous peers interacting with each other through messages. Modeling and analysis of interactions among the peers is a crucial problem in this domain due to following reasons: 1) Organizations may not want to share the internal details of the services they provide to other organizations. In order to achieve decoupling among different peers, it is necessary to specify the interactions among different services without referring to the details of their local implementations. 2) Modeling and analyzing the global behavior of this type of distributed systems is particularly challenging since no single party has access to the internal states of all the participating peers. Desired behaviors have to be specified as constraints on the interactions among different peers since the interactions are the only observable global behavior. Moreover, for this type of distributed systems, it might be worthwhile to specify the interactions among different peers before the services are implemented. Such a top-down design strategy may help different organizations to better coordinate their development efforts.
- Published
- 2008
- Full Text
- View/download PDF
41. Adaptive Priority Based Distributed Dynamic Channel Assignment for Multi-radio Wireless Mesh Networks
- Author
-
Tope R. Kareem, H. Anthony Chan, N. Ntlatlapa, and Karel Matthee
- Subjects
Wireless mesh network ,Computational complexity theory ,business.industry ,Computer science ,Iterative method ,Distributed computing ,Order One Network Protocol ,Design strategy ,Shared mesh ,Switched mesh ,business ,Computer network ,Communication channel - Abstract
This paper investigates the challenges involve in designing a dynamic channel assignment (DCA) scheme for wireless mesh networks, particularly for multi-radio systems. It motivates the need for fast switching and process coordination modules to be incorporated in DCA algorithm for multi-radio systems. The design strategy is based on a reinterpretation of an adaptive priority mechanism as an iterative algorithm that recursively allocate a set of channels to radios in a fair and efficient manner in order to minimise interference and maximise throughputs. The algorithm, called Adaptive Priority Multi-Radio Channel Assignment (APMCA) is tested for overall performance to assess the effectiveness by determining its overall computational complexity. The combined advantages of fast switching time and process coordination modules make the APMCA a useful candidate towards automating the channel assignment method in multi-radio wireless mesh network planning and design.
- Published
- 2008
- Full Text
- View/download PDF
42. Design of a Mobile Agent-Based Workflow Management System
- Author
-
Han Namgoong, Dong-Ik Lee, Young-Ho Suh, and Jeong-Joon Yoo
- Subjects
Delegation ,Process (engineering) ,business.industry ,Computer science ,Distributed computing ,media_common.quotation_subject ,Design strategy ,Workflow ,Embedded system ,Scalability ,Systems architecture ,Mobile agent ,business ,Workflow management system ,media_common - Abstract
This paper deals with several architectural issues on a mobile agent-based workflow management system(WFMS). We mainly focus on performance and scalability issues among various architectural issues. We point out three major design issues that are indispensable for designing a mobile agent-based WFMS and find solutions for the issues. We propose an efficient design strategy based on the solutions, i.e. a mobile agent-based '2-tier distributed workflow server architecture', 'process execution structure through hierarchical delegation' and 'introduction of a non-trivial delegation model'. We also present both a mobile agent based 3-tier run-time architecture and a process execution scenario, which are established according to the proposed strategy. Finally, we show the effectiveness of the proposed method by evaluating performance and scalability through GSPN simulation.
- Published
- 2007
- Full Text
- View/download PDF
43. MAME: A Compression Function with Reduced Hardware Requirements
- Author
-
Bart Preneel, Jun Kitahara, Dai Watanabe, Katsuyuki Okeya, Hongjun Wu, Hirotaka Yoshida, and Özgül Küçük
- Subjects
Variable (computer science) ,MD5 ,Computer science ,business.industry ,Chaining ,Hash function ,Cryptographic hash function ,Function (mathematics) ,Design strategy ,business ,Computer hardware ,Block (data storage) - Abstract
This paper describes a new compression function, MAME designed for hardware-oriented hash functions which can be used in applications with reduced hardware requirements. MAME takes a 256-bit message block and a 256-bit chaining variable as input and produces a 256-bit output. In the light of recent attacks on MD5 and SHA-1, our design strategy is very conservative, and we show that our compression function is secure against various kinds of widely known attacks with very large security margins. The simple logical operations and the hardware efficient S-boxes are used to achieve a hardware implementation of MAME requiring only 8.1 Kgates on 0.18 μmtechnology.
- Published
- 2007
- Full Text
- View/download PDF
44. Abstract Modeling and Formal Verification of Microprocessors
- Author
-
Ziyad Hanna
- Subjects
Functional verification ,business.industry ,Programming language ,Computer science ,Design specification ,Formal equivalence checking ,Design strategy ,computer.software_genre ,Hardware emulation ,Formal methods ,Probabilistic design ,Software engineering ,business ,computer ,Formal verification - Abstract
Moore's Law continues to drive a severe increase in the number of transistors that can be integrated onto a single microprocessor chip. Computer architects and designers continue to look for ways to take advantage from it to produce ever more complex microprocessors. Meanwhile, market forces are dictating a shorter time to market, a proliferation of product and steeper volume ramps in production. However, it is evident that logic correctness is one of the main challenges that computer engineers usually face during the design and validation of such systems. In the last 20 years, researchers and industrial experts invented several modeling and validation technologies, such as logic simulation, fast hardware emulation engines, and formal methods. However the design size and complexity continue to grow and outstrip what the validation techniques can do for producing high quality and correct systems. As a results, the validation problem is becoming more complex to solve and is indeed the main limiter for producing a high quality silicon products. Design abstraction and high level modeling is a fundamental design strategy to cope with system complexity. The basic idea is to hide design implementation details, while focusing on design specification, capturing the pure logic properties and behaviors of the system. Doing this, we believe that the size of the design model can be dramatically decreased because none functional or physical properties of the design are excluded. Therefore the design representation is purely logical and have a clear semantics which it becomes easier to understand, easier and faster to validate using dynamic or formal techniques, so design errors can be detected earlier before going into detailed implementation and thus avoid a costly design iterations due to late soundness issues. In this talk we will present abstract modeling techniques and their verification challenges. In particular we will describe the Abstract State Machines approach for modeling and verification of high level models. In addition we will outline several research topics in this domain to encourage the academic community to take an active part in exploring and developing new verification methods that can cope with the increasing complexity of microprocessors' design.
- Published
- 2007
- Full Text
- View/download PDF
45. Sliding Mode Observers and Their Application in Fault Diagnosis
- Author
-
Yi Xiong and Mehrdad Saif
- Subjects
Nonlinear system ,Observer (quantum physics) ,Control theory ,Computer science ,Linear system ,Design strategy ,Mechatronics ,Fault (power engineering) ,Representation (mathematics) ,Fault detection and isolation - Abstract
Two commonly used approaches to sliding mode observer (SMO) design, namely the equivalent control approach of Utkin and the Walcott and Zak’s observer design strategies are reviewed. Ceratin limitations of each design strategy are discussed and two alternative design approach for the Walcott and Zak observer based on the representation of a linear system in special coordinate basis (SCB) from are given. Additionally, a comparative discussion between the SMO and the unknown input observer (UIO) is provided, along with a discussion on similarities and differences between the two observer design strategies. Next a new sliding mode observer for linear uncertain systems is discussed. The advantage of this observer is that it can be built under much less conservative conditions than the one discussed. In addition, we address the issue of estimating a function of the state as well as unknown inputs or structural uncertainties. Furthermore, basic SMO design idea is extended to certain class of nonlinear uncertain systems. Next, we discuss how these SMOs can be used for fault detection and isolation (FDI) purposes. Finally, a number of examples illustrating the application of the SMO in mechatronic applications such as fault diagnosis of an internal combustion engine, robots, and electric motors are presented.
- Published
- 2007
- Full Text
- View/download PDF
46. Deriving Secrecy in Key Establishment Protocols
- Author
-
Dusko Pavlovic and Catherine Meadows
- Subjects
Authentication ,Computer science ,media_common.quotation_subject ,Design strategy ,Cryptographic protocol ,Mathematical proof ,Computer security ,computer.software_genre ,Encapsulation (networking) ,Interdependence ,Scalability ,Secrecy ,computer ,media_common - Abstract
Secrecy and authenticity properties of protocols are mutually dependent: every authentication is based on some secrets, and every secret must be authenticated. This interdependency is a significant source of complexity in reasoning about security. We describe a method to simplify it, by encapsulating the authenticity assumptions needed in the proofs of secrecy. This complements the method for encapsulating the secrecy assumptions in proofs of authenticity, presented in [1]. While logically straightforward, this idea of encapsulation in general, and the present treatment of secrecy in particular, allow formulating scalable and reusable reasoning patterns about the families of protocols of practical interest. The approach evolved as a design strategy in the Protocol Derivation Assistant (Pda), a semantically based environment and toolkit for derivational approach to security [2,3].
- Published
- 2006
- Full Text
- View/download PDF
47. Beyond Digital Incunabula: Modeling the Next Generation of Digital Libraries
- Author
-
Lisa Cerrato, D. Sculley, Gregory Crane, David Mimno, Adrian Packel, Alison Jones, David Bamman, and Gabriel Weaver
- Subjects
World Wide Web ,Computer science ,Incunabula ,Design strategy ,Digital library ,Electronic library ,Personalization - Abstract
This paper describes several incunabular assumptions that impose upon early digital libraries the limitations drawn from print, and argues for a design strategy aimed at providing customization and personalization services that go beyond the limiting models of print distribution, based on services and experiments developed for the Greco-Roman collections in the Perseus Digital Library. Three features fundamentally characterize a successful digital library design: finer granularity of collection objects, automated processes, and decentralized community contributions.
- Published
- 2006
- Full Text
- View/download PDF
48. Virtual Games: A New Approach to Implementation of Social Choice Rules
- Author
-
Daniel L. Kovacs
- Subjects
Collective behavior ,Strategy ,Computer science ,business.industry ,Management science ,Intelligent decision support system ,Systems design ,Design strategy ,Artificial intelligence ,Everyday life ,business ,Social choice theory ,Game theory - Abstract
Intelligent systems play a crucial role in our everyday life. Yet there is still no general concept for designing such systems (at an individual, social, and inter-social level). Intelligent systems are designed on a case-by-case basis, mostly in an ad-hoc fashion lacking any kind of general design strategy. Nonetheless there are theories, which capture some profound aspects of the problem. One of them is the theory of implementation of social choice rules, which is concerned with the collective behavior in multi-agent systems. However the roots of the theory lie in social sciences, so its approach is not suitable enough for multi-agent system design. This article introduces a new game theoretic approach to implementation of social choice rules, which enables design of provably optimal multi-agent system without any restriction in general.
- Published
- 2005
- Full Text
- View/download PDF
49. Exploring Cultural Information Interaction Design: A Case Study of a Multimedia Exhibition Based on Customizable User Interfaces
- Author
-
George Pehlivanides
- Subjects
Information management ,Multimedia ,Computer science ,Design strategy ,Interaction design ,computer.software_genre ,Exhibition ,Cultural heritage ,Human–computer interaction ,Exhibit design ,Information system ,Tangible user interface ,Cultural heritage management ,User interface ,computer - Abstract
The study of cultural content promotion methods, through an interdisciplinary approach, suggests new ways of information management, as well as new representation practices, which constitute the basis of new negotiation methodologies. Cultural Information Systems through a variety of possible interfaces, formed according to each given promotion strategy, suggest the study, within a broader research field, of new ways of information structure management, introducing new kinds of knowledge formation and consequently new interpretation tools of awareness. As a result of the interdisciplinary approach regarding cultural heritage management and subsequently of the possibility of parameterization regarding the forms of scientific fields and the practices of the specialities involved, a new design field is defined, the Cultural Information Interaction Design field. Under the framework of Cultural Information Interaction Design, this paper presents a case study of a multimedia exhibition implementing a method for interactive exhibit design based on Customizable User Interfaces, depended on given design problems and focused on parameterized sensorial approaches and presentation techniques. The exhibition design strategy was focused on the design of interactive exhibits with a sensorial emphasis on tangibility, proposing in that way novel forms of cultural representation practices.
- Published
- 2005
- Full Text
- View/download PDF
50. A New Strategy for Designing Bidirectional Associative Memories
- Author
-
Sidney N. Givigi, Gengsheng Zheng, and Weiyu Zheng
- Subjects
Search algorithm ,Encoding (memory) ,Bidirectional associative memory ,Design strategy ,Performance improvement ,Gradient descent ,Gradient method ,Algorithm ,Associative property ,Mathematics - Abstract
A comprehensive strategy for bidirectional associative memories (BAMs) is presented, which enhances storage capacity greatly. The design strategy combines the dummy augmentation encoding method with optimal gradient descent algorithm. The proposed method increases the storage capacity performance of BAM to its upper limit compared with original Kosko method and optimal gradient descent algorithm. Computer simulations and comparison are given based on three methods to demonstrate the performance improvement of the proposed strategy.
- Published
- 2005
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.