scholarly journals A PEER REVIEWED ONLINE COMPUTATIONAL MODELING FRAMEWORK

Author(s):  
Pieter J. Mosterman ◽  
Don Bouldin ◽  
Andrzej Rucinski

Along with theory and experimentation, computational simulation has become the third pillar of scientific discovery. While in industry computational modeling has seen application at an enterprise-wide level in the context of Model-Based Design, in academia models are typically still limited to isolated use by specialists. Once a project is completed, the intellectual property embodied by the model is lost. To harness the effort spent, a networked repository is proposed that stores peer-reviewed models. These models are evaluated whether they adhere to a set of quality requirements so they capture intrinsic value. This would facilitate the type of multi-disciplinary collaboration that is required to engineer the systems that have emerged and that continue to gain in importance. This work puts forward an outline of such a peer-reviewed online repository.

Author(s):  
Wen-Han Zhu ◽  
Wei Sun ◽  
Xiong-Kuo Min ◽  
Guang-Tao Zhai ◽  
Xiao-Kang Yang

AbstractObjective image quality assessment (IQA) plays an important role in various visual communication systems, which can automatically and efficiently predict the perceived quality of images. The human eye is the ultimate evaluator for visual experience, thus the modeling of human visual system (HVS) is a core issue for objective IQA and visual experience optimization. The traditional model based on black box fitting has low interpretability and it is difficult to guide the experience optimization effectively, while the model based on physiological simulation is hard to integrate into practical visual communication services due to its high computational complexity. For bridging the gap between signal distortion and visual experience, in this paper, we propose a novel perceptual no-reference (NR) IQA algorithm based on structural computational modeling of HVS. According to the mechanism of the human brain, we divide the visual signal processing into a low-level visual layer, a middle-level visual layer and a high-level visual layer, which conduct pixel information processing, primitive information processing and global image information processing, respectively. The natural scene statistics (NSS) based features, deep features and free-energy based features are extracted from these three layers. The support vector regression (SVR) is employed to aggregate features to the final quality prediction. Extensive experimental comparisons on three widely used benchmark IQA databases (LIVE, CSIQ and TID2013) demonstrate that our proposed metric is highly competitive with or outperforms the state-of-the-art NR IQA measures.


2018 ◽  
Vol 12 (1) ◽  
pp. 114
Author(s):  
Mohammad Niqresh

The study aims at identifying the concept of digital library, it also tries to shed the light on the most significant intellectual issues by presenting its definition, development, functions (selection and acquisition of information resources from the web, sources indexing, communication and management of intellectual property rights, production of electronic resources and its availability, and digital resources maintaining), characteristics, and the purpose of turning into digital library, passed by the proposed stages of digital library transition, Types of Intellectual Property (Copyright, Patents, Trademarks, Commercial Secrets), it also discusses copyrights and intellectual property, the problems and challenges of digital library, and finally the future of digital library. Many researchers agree that the main objective of the digital library is to accomplish all the functions of the traditional library, but in the form of electronic digital libraries which are only an extension for jobs that are performed and the resources that are accessible in digital library. The study concluded that digital libraries emerged as an obligatory result of revolution of the third millennium which is called the communications revolution, as libraries are able to prove that they are able to stand and cope with all the modern technology, where there is no conflict between the new and modern trends in libraries issue, but it also benefits from both of them concerning their evolution instruments in service for beneficiaries in every time and place.


2021 ◽  
Vol 12 (8) ◽  
pp. 2161-2179
Author(s):  
Daiane Maria de Genaro Chiroli ◽  
Raíza Conde Coradazi ◽  
Fabio Jose Ceron Branco ◽  
Yslene Rocha Kachba ◽  
Franciely Velozo Aragão ◽  
...  

Healthcare logistics play an important role in management, being attributed the activities of acquisition, distribution and movement of materials, professionals and patients. This work aims to develop a study, using the healthcare logistics in the movement of patients in the third health region of Paraná, proposing a linear programming problem that will pass through a computational simulation, considering the existing demands and constraints in the system, aiming to optimize the flow of patients from this region. The present study developed four mathematical models, based on demands and constraints followed by linear programming in order to find the best possible solution for the flow of patients from the third health region of the state of Paraná. The study developed reached its goal of optimization, generating an economy in the transportation of patients. Through the analysis of the results, it is concluded that the model that best suits the presented problem is the one of costs minimization, since the one of vehicles presented higher costs. Possibly the model that minimizes the vehicles would bring better results if the vehicles were not outsourced, but of the Ponta Grossa City Hall (PMPG). Was possible to verify the importance of the theme, especially when referring to the flow of patients in the health services due to the lack of studies with this specific approach. Even with the scarcity of data, it is possible to notice the potential for improvements on this patient transport system.


Author(s):  
Ayda Saidane ◽  
Nicolas Guelfi

The quality of software systems depends strongly on their architecture. For this reason, taking into account non-functional requirements at architecture level is crucial for the success of the software development process. Early architecture model validation facilitates the detection and correction of design errors. In this research, the authors are interested in security critical systems, which require a reliable validation process. So far, they are missing security-testing approaches providing an appropriate compromise between software quality and development cost while satisfying certification and audit procedures requirements through automated and documented validation activities. In this chapter, the authors propose a novel test-driven and architecture model-based security engineering approach for resilient systems. It consists of a test-driven security modeling framework and a test based validation approach. The assessment of the security requirement satisfaction is based on the test traces analysis. Throughout this study, the authors illustrate the approach using a client server architecture case study.


2014 ◽  
pp. 2072-2098
Author(s):  
Ayda Saidane ◽  
Nicolas Guelfi

The quality of software systems depends strongly on their architecture. For this reason, taking into account non-functional requirements at architecture level is crucial for the success of the software development process. Early architecture model validation facilitates the detection and correction of design errors. In this research, the authors are interested in security critical systems, which require a reliable validation process. So far, they are missing security-testing approaches providing an appropriate compromise between software quality and development cost while satisfying certification and audit procedures requirements through automated and documented validation activities. In this chapter, the authors propose a novel test-driven and architecture model-based security engineering approach for resilient systems. It consists of a test-driven security modeling framework and a test based validation approach. The assessment of the security requirement satisfaction is based on the test traces analysis. Throughout this study, the authors illustrate the approach using a client server architecture case study.


Although Peirce states that abduction is the “only logical operation which introduces any new idea,” many, if not most, explanatory hypotheses offer nothing new at all. They do not seem to be, in the sense Peirce means, abductively derived. In various writings, Peirce provides at least four different descriptions of abduction. Italian computational philosopher Lorenzo Magnani proposes three types of abduction: theoretical, model-based, and creative (the final chapter of this book discusses the third type). In her 2005 paper for Semiotica (“Abduction as an Aspect of Retroduction”), Chiasson points out that Peirce uses two distinct and contradictory terms to signify these processes. The purpose of this chapter is to clarify the various ways abduction has been defined. In addition to defining abduction as an aspect of retroduction, the authors discuss induction, with which abduction is often confounded. This discussion of induction includes the concepts diagnosis and inference to the best explanation, both of which can be achieved inductively (and deductively as well, though deduction will not be addressed here), as well as abductively.


Sign in / Sign up

Export Citation Format

Share Document