software implementation
Recently Published Documents


TOTAL DOCUMENTS

1226
(FIVE YEARS 383)

H-INDEX

31
(FIVE YEARS 5)

2022 ◽  
Vol 12 (2) ◽  
pp. 762
Author(s):  
Damjan Vavpotič ◽  
Diana Kalibatiene ◽  
Olegas Vasilecas ◽  
Tomaž Hovelja

Today, businesses need to continuously adjust to a dynamic environment. Enterprises have to deal with global competition and technological advances, meet government regulations, and keep their expenses under control. Under these pressures, enterprises need to implement and improve software that supports and helps to evolve their business. However, as practice shows, software implementation projects are complex, and a considerable percentage of them do not meet business requirements. Therefore, a business needs to manage software implementation properly. Existing research shows that using business rules (BR) in software implementation projects helps to ensure its success. The purpose of our study is to advance the understanding of how BR affect software implementation success, namely, which key characteristics of BR are the most important. To achieve this goal, the top thousand enterprises in Slovenia, by added value, facing typical software implementation projects were surveyed. The obtained results show that BR that are specifically prepared for a particular project and easy to understand have a statistically significant positive effect on software implementation project success.


Micromachines ◽  
2022 ◽  
Vol 13 (1) ◽  
pp. 98
Author(s):  
Eugeny Ryndin ◽  
Natalia Andreeva ◽  
Victor Luchinin

The article presents the results of the development and study of a combined circuitry (compact) model of thin metal oxide films based memristive elements, which makes it possible to simulate both bipolar switching processes and multilevel tuning of the memristor conductivity taking into account the statistical variability of parameters for both device-to-device and cycle-to-cycle switching. The equivalent circuit of the memristive element and the equation system of the proposed model are considered. The software implementation of the model in the MATLAB has been made. The results of modeling static current-voltage characteristics and transient processes during bipolar switching and multilevel turning of the conductivity of memristive elements are obtained. A good agreement between the simulation results and the measured current-voltage characteristics of memristors based on TiOx films (30 nm) and bilayer TiO2/Al2O3 structures (60 nm/5 nm) is demonstrated.


Robotics ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 7
Author(s):  
Yannick Roberts ◽  
Amirhossein Jabalameli ◽  
Aman Behal

Motivated by grasp planning applications within cluttered environments, this paper presents a novel approach to performing real-time surface segmentations of never-before-seen objects scattered across a given scene. This approach utilizes an input 2D depth map, where a first principles-based algorithm is utilized to exploit the fact that continuous surfaces are bounded by contours of high gradient. From these regions, the associated object surfaces can be isolated and further adapted for grasp planning. This paper also provides details for extracting the six-DOF pose for an isolated surface and presents the case of leveraging such a pose to execute planar grasping to achieve both force and torque closure. As a consequence of the highly parallel software implementation, the algorithm is shown to outperform prior approaches across all notable metrics and is also shown to be invariant to object rotation, scale, orientation relative to other objects, clutter, and varying degree of noise. This allows for a robust set of operations that could be applied to many areas of robotics research. The algorithm is faster than real time in the sense that it is nearly two times faster than the sensor rate of 30 fps.


Author(s):  
Vitalii Naumov ◽  
Laura Bekmagambetova ◽  
Zukhra Bitileuova ◽  
Zhumazhan Zhanbirov ◽  
Igor Taran

One of the main problems to be solved by the transport operators is the substantiation of the vehicle models servicing the transport lines. A gametheoretical approach is proposed in this paper to justify the bus model choice based on the passengers’ preferences and the structure of the passenger flows. To estimate the customers’ preferences, the membership functions for fuzzy sets of the optimal vehicle models were defined. The simulation experiment aiming to estimate the city fleet structure in terms of the vehicles’ capacity was conducted for the Talas city (Kazakhstan) based on the proposed approach with use of the corresponding software implementation of the developed mathematical models. As a result of the experimental studies, the impact of the passengers’ flow structure and the number of carriers on the rational structure of the city bus fleet was studied in the paper.


2021 ◽  
Vol 12 (5-2021) ◽  
pp. 117-127
Author(s):  
Svetlana N. Malygina ◽  
◽  
Elena O. Neupokoeva ◽  

The article discusses the development of a simulation model of a production cluster by means of the Anylogic University 8.7 software tool system using agent-based and system-dynamic approaches. The authors focus on isualization tools and software implementation of algorithms for the movement of labor resources within the cluster enterprises, taking into account various restrictions.


2021 ◽  
Vol 6 (1) ◽  
Author(s):  
R. Aaij ◽  
M. Adinolfi ◽  
S. Aiola ◽  
S. Akar ◽  
J. Albrecht ◽  
...  

AbstractThe Large Hadron Collider beauty (LHCb) experiment at CERN is undergoing an upgrade in preparation for the Run 3 data collection period at the Large Hadron Collider (LHC). As part of this upgrade, the trigger is moving to a full software implementation operating at the LHC bunch crossing rate. We present an evaluation of a CPU-based and a GPU-based implementation of the first stage of the high-level trigger. After a detailed comparison, both options are found to be viable. This document summarizes the performance and implementation details of these options, the outcome of which has led to the choice of the GPU-based implementation as the baseline.


Author(s):  
Rishi S. Mevada ◽  
Soham Sandansingh

“What Is Engineering?, Engineering is the mean by which we take “our” scientific knowledge of the world and use it to invent, design and build new technology. In the 21st century if we are to look around in our society, we will see most of it displays several marvels of engineering, which shows why it is an important discipline. The field of engineering consists of a vast sea of knowledge whose boundary is infinite. And through the discoveries and breakthroughs made by engineers almost every day, the expertise and information keep growing. Now we are here to introduce “our” device which can produce different sound just by touching the fruits. This device can also help us to produce different genres of music. This paper can also explain the working principle and application of a FRUIT BOARD using Arduino, this can also be used as a tool for students which are learning or pursuing music. The fruit board using Arduino uno can provide a quick tool in production of music. Today the increasing number of people interested in music can easily afford the Fruit board because it can be also connected with some of the standard softwares such as flstudios, ableton live and logic pro, which makes the music production easy and cheaper. This paper can provide a glimpse of fruit board using Arduino, working principle, software implementation and their applications.


2021 ◽  
Vol 10 (47) ◽  
pp. 81-92
Author(s):  
Andrey V. Silin ◽  
Olga N. Grinyuk ◽  
Tatyana A. Lartseva ◽  
Olga V. Aleksashina ◽  
Tatiana S. Sukhova

This article discusses an approach to creating a complex of programs for the implementation of cluster analysis methods. A number of cluster analysis tools for processing the initial data set and their software implementation are analyzed, as well as the complexity of the application of cluster data analysis. An approach to data is generalized from the point of view of factual material that supplies information for the problem under study and is the basis for discussion, analysis and decision-making. Cluster analysis is a procedure that combines objects or variables into groups based on a given rule. The work provides a grouping of multivariate data using proximity measures such as sample correlation coefficient and its module, cosine of the angle between vectors and Euclidean distance. The authors proposed a method for grouping by centers, by the nearest neighbor and by selected standards. The results can be used by analysts in the process of creating a data analysis structure and will improve the efficiency of clustering algorithms. The practical significance of the results of the application of the developed algorithms is expressed in the software package created by means of the C ++ language in the VS environment.


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8451
Author(s):  
Dmitry Levshun ◽  
Andrey Chechulin ◽  
Igor Kotenko

This paper describes an original methodology for the design of microcontroller-based physical security systems and its application for the system of mobile robots. The novelty of the proposed methodology lies in combining various design algorithms on the basis of abstract and detailed system representations. The suggested design approach, which is based on the methodology, is modular and extensible, takes into account the security of the physical layer of the system, works with the abstract system representation and is looking for a trade-off between the security of the final solution and the resources expended on it. Moreover, unlike existing solutions, the methodology has a strong focus on security. It is aimed at ensuring the protection of the system against attacks at the design stage, considers security components as an integral part of the system and checks if the system can be designed in accordance with given requirements and limitations. An experimental evaluation of the methodology was conducted with help of its software implementation that consists of Python script, PostgreSQL database, Tkinter interface and available for download on our GitHub. As a use case, the system of mobile robots for perimeter monitoring was chosen. During the experimental evaluation, the design time was measured depending on the parameters of the attacker against which system security must be ensured. Moreover, the software implementation of the methodology was analyzed in compliance with requirements and compared with analogues. The advantages and disadvantages of the methodology as well as future work directions are indicated.


Sign in / Sign up

Export Citation Format

Share Document