Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Engineering
An Investigation Into The Analysis Of Truncated Standard Normal Distributions Using Heuristic Techniques, John Walter Ralls
An Investigation Into The Analysis Of Truncated Standard Normal Distributions Using Heuristic Techniques, John Walter Ralls
Engineering Management & Systems Engineering Theses & Dissertations
Standard normal distributions (SND) and truncated standard normal distributions (TSND) have been widely used and accepted methods to characterize the data sets in various engineering disciplines, financial industries, medical fields, management, and other mathematic and scientific applications. For engineering managers, risk managers and quality practitioners, the use of the standard normal distribution and truncated standard normal distribution have particular relevance when bounding data sets, evaluating manufacturing and assembly tolerances, and identifying measures of quality. In particular, truncated standard normal distributions are used in areas such as component assemblies to bound upper and lower process specification limits.
This dissertation presents a …
Formal Verification Of Urban Traffic System Using The Concept Of Fuzzy Workflow Simulation, Manuj Darbari, Abhay Kumar Srivastava, Sanjay Medhavi
Formal Verification Of Urban Traffic System Using The Concept Of Fuzzy Workflow Simulation, Manuj Darbari, Abhay Kumar Srivastava, Sanjay Medhavi
Journal of International Technology and Information Management
Modeling complex urban traffic system requires extensive use of workflow methodologies which can simulate almost real time traffic situations. Number of studies were done in the field of Urban Traffic Simulation like PLOTS, NETSIM and PALAMICS but none of them could provide a real formal solution. Our paper proposes a methodology using Fuzzy Petri nets for modeling real time traffic system. Fuzzy Petrinets are also visualised and tested by using Flow- Charter and HPSIM software packages. These packages help in providing successive iterations of process model for further refinement.
An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen
An Examination Of Internet Effectiveness For Non-Work Activities, Pruthikrai Mahatanankoon, Tim Klaus, H. Joseph Wen
Journal of International Technology and Information Management
The Internet is frequently used for non-work activities. When used for these purposes, the effectiveness of the Internet in accomplishing these leisure activities becomes an important consideration. Research literature has remained relatively silent in regards to the examination of accomplishing non-work tasks through the Internet. This study uses Davis’ Technology Acceptance Model (TAM) as a basis to predict different types of common user web activities—entertainment, communicating, and information searching. Using Structured Equation Modeling, this paper examines the effectiveness of the Internet in accomplishing non-work activities. In this study, the overall analysis of the survey data suggests that perceived ease of …
The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht
The Role Of Quantitative Analysis In The Information Security Systems Development Lifecycle, Stephen R. Rosenkranz, Michael E. Busing, Faye P. Teer, Karen A. Forcht
Journal of International Technology and Information Management
Today’s numerous Quantitative Analysis (QA) tools have been successfully utilized to solve business problems in diverse applications. However, the application of QA tools in solving information security problems has been sparse. Devising the means and ways to use QA tools in resolving industry-wide security problems has the potential to yield enormous global economic benefit. The purpose of this paper is to explore the use of QA tools as a means of improving the processes involved in the Information Security Systems Development Lifecycle (SecSDL). Information security professionals use the SecSDL as a guide for formulating a comprehensive information security program. The …