There is severe competition among big foreign automakers who already have best management systems as well as the minimum finished cost by using high technology. So, it is necessary for Iranian automakers to replace ancient managerial methods with newest ones. Moreover, joining to WTO which is another target of Iranian economy makes this situation clear that we have to present new methods. Eprocurement will be one of the solutions for improving competition capability in automotive industry in Iran. This research aims to explore the degree of e-procurement usage and finding benefits and limitations of applying it in five main automotive Iranian companies included: 1. Zamyad (Z), 2. Topco (T), 3. Saze Go stare SAIPA (SGS), 4. Sanaye Khodrosazi Kerman (SKK) 5. Sapco(S).
外国大型汽车制造商之间的竞争非常激烈,因为它们已经拥有最好的管理体系,而且利用高科技将成品成本降到最低。因此,伊朗汽车企业有必要用最新的经营方式取代旧的经营方式。此外,加入世贸组织是伊朗经济的另一个目标,这表明我们必须提出新的方法。电子采购将是提高伊朗汽车行业竞争力的解决方案之一。本研究旨在探讨电子采购的使用程度,并发现在五个主要的伊朗汽车公司中应用它的好处和局限性,包括:Zamyad (Z), 2;Topco (T), 3;Saze Go stare SAIPA (SGS), 4。萨纳耶·霍德罗萨齐·克尔曼(SKK)Sapco(年代)。
{"title":"Investigating Benefits and Limitations of E-Procurement in B2B Automakers Companies in Iran","authors":"Behnam Bahreman","doi":"10.1109/ITNG.2013.119","DOIUrl":"https://doi.org/10.1109/ITNG.2013.119","url":null,"abstract":"There is severe competition among big foreign automakers who already have best management systems as well as the minimum finished cost by using high technology. So, it is necessary for Iranian automakers to replace ancient managerial methods with newest ones. Moreover, joining to WTO which is another target of Iranian economy makes this situation clear that we have to present new methods. Eprocurement will be one of the solutions for improving competition capability in automotive industry in Iran. This research aims to explore the degree of e-procurement usage and finding benefits and limitations of applying it in five main automotive Iranian companies included: 1. Zamyad (Z), 2. Topco (T), 3. Saze Go stare SAIPA (SGS), 4. Sanaye Khodrosazi Kerman (SKK) 5. Sapco(S).","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125420149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sang Hun Park, D. Shin, B. Kim, Myoung Young Lee, H. Baik, Dong Heon Lee, Jeong-Hwan Seo, Chulgyu Song
The need for an inexpensive, real-time, high-resolution diagnosis for osteoarthritis (OA) is profound. After inducing OA in rats, we monitored the degradation of the articular cartilage by experimentally using in-house developed common-path Fourier-domain optical coherence tomography (CP-FDOCT). To observe the progression of OA, we injected monosodium iodoacetate (MIA) into the left knee joint. The histological images showed patterns that are similar to OCT images. These results illustrated the potential of CP-FDOCT for use in the noninvasive diagnosis of this particular grade of OA.
{"title":"Real-time, High-resolution Diagnosis for Osteoarthritis in the Rat Using Common-Path Fourier-Domain Optical Coherence Tomography","authors":"Sang Hun Park, D. Shin, B. Kim, Myoung Young Lee, H. Baik, Dong Heon Lee, Jeong-Hwan Seo, Chulgyu Song","doi":"10.1109/ITNG.2013.133","DOIUrl":"https://doi.org/10.1109/ITNG.2013.133","url":null,"abstract":"The need for an inexpensive, real-time, high-resolution diagnosis for osteoarthritis (OA) is profound. After inducing OA in rats, we monitored the degradation of the articular cartilage by experimentally using in-house developed common-path Fourier-domain optical coherence tomography (CP-FDOCT). To observe the progression of OA, we injected monosodium iodoacetate (MIA) into the left knee joint. The histological images showed patterns that are similar to OCT images. These results illustrated the potential of CP-FDOCT for use in the noninvasive diagnosis of this particular grade of OA.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121377620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christoph Thuemmler, Julius Mueller, S. Covaci, T. Magedanz, S. D. Panfilis, T. Jell, Armin Schneider, A. Gavras
Health care providers have over years continuously rejected Public Cloud technology for understandable concerns regarding privacy and confidentiality. The pick up rate on cloud computing in health care has been very poor reminding at the typical hype curve profile. Coincidentally Google Health has been discontinued and Microsoft Health Vault has switched focus and turned to the slightly "softer" ambient assisted living market. It seems that the idea of using Platforms as a Service and Software as a Service to manage and distribute patient data in support of new distributed patient centric care models and services will require second thoughts and new ideas in order to receive another chance to penetrate global health care markets. The 2010 EC Cloud report briefly discussed the possibility of a reverse cloud approach aiming at sending software to the data rather than the other way round [1]. This thought seems to be worthwhile exploring further, as it would also sit well with the fact that the overall amount of data is currently growing much faster than the available bandwidth, a gap that continues to widen. Therefore it would be entirely reasonable to consider ideas to bring the software to the data rather than the other way round. This approach would also address existing governance, QoS and security issues. Our paper proposes a taxonomy and an architecture for the implementation of the software-to-data-paradigm in health care scenarios. The model is based on the "FI Core Platform" an innovative concept currently under investigation under the European 7th Framework (FP7)[2].
{"title":"Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid Clouds","authors":"Christoph Thuemmler, Julius Mueller, S. Covaci, T. Magedanz, S. D. Panfilis, T. Jell, Armin Schneider, A. Gavras","doi":"10.1109/ITNG.2013.77","DOIUrl":"https://doi.org/10.1109/ITNG.2013.77","url":null,"abstract":"Health care providers have over years continuously rejected Public Cloud technology for understandable concerns regarding privacy and confidentiality. The pick up rate on cloud computing in health care has been very poor reminding at the typical hype curve profile. Coincidentally Google Health has been discontinued and Microsoft Health Vault has switched focus and turned to the slightly \"softer\" ambient assisted living market. It seems that the idea of using Platforms as a Service and Software as a Service to manage and distribute patient data in support of new distributed patient centric care models and services will require second thoughts and new ideas in order to receive another chance to penetrate global health care markets. The 2010 EC Cloud report briefly discussed the possibility of a reverse cloud approach aiming at sending software to the data rather than the other way round [1]. This thought seems to be worthwhile exploring further, as it would also sit well with the fact that the overall amount of data is currently growing much faster than the available bandwidth, a gap that continues to widen. Therefore it would be entirely reasonable to consider ideas to bring the software to the data rather than the other way round. This approach would also address existing governance, QoS and security issues. Our paper proposes a taxonomy and an architecture for the implementation of the software-to-data-paradigm in health care scenarios. The model is based on the \"FI Core Platform\" an innovative concept currently under investigation under the European 7th Framework (FP7)[2].","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126399398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Model-based testing of software has proved effective for automation of testing and efficient error discovery, by utilizing modeled behavior of the system under test and automated test case generation. One of the important challenges in model-based testing is locating the fundamental sources of encountered errors. A root cause analysis solution should be able to find the causes of errors among different components in a model-based testing process, while automating the analysis to eliminate daunting data-intensive manual work. We present a design for a Root Cause Analyzer (RCA) component, aimed at automated test analysis utilizing the outputs generated in a model-based testing process, and producing human and machine readable analysis reports. A prototype RCA implementation is integrated into a tool chain used for offline functional testing of a Mobile Switching Server (MSS) in cellular networks. The RCA prototype is shown to discover causes of errors encountered during testing and pinpointing them in several components of the testing environment. The RCA design also demonstrates potential for integration into other model-based testing processes.
{"title":"Integration of Root Cause Analysis into a Model-Based Testing Process of a Mobile Switching Server","authors":"M. Nieminen, Tomi D. Räty, Risto Teittinen","doi":"10.1109/ITNG.2013.49","DOIUrl":"https://doi.org/10.1109/ITNG.2013.49","url":null,"abstract":"Model-based testing of software has proved effective for automation of testing and efficient error discovery, by utilizing modeled behavior of the system under test and automated test case generation. One of the important challenges in model-based testing is locating the fundamental sources of encountered errors. A root cause analysis solution should be able to find the causes of errors among different components in a model-based testing process, while automating the analysis to eliminate daunting data-intensive manual work. We present a design for a Root Cause Analyzer (RCA) component, aimed at automated test analysis utilizing the outputs generated in a model-based testing process, and producing human and machine readable analysis reports. A prototype RCA implementation is integrated into a tool chain used for offline functional testing of a Mobile Switching Server (MSS) in cellular networks. The RCA prototype is shown to discover causes of errors encountered during testing and pinpointing them in several components of the testing environment. The RCA design also demonstrates potential for integration into other model-based testing processes.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126855925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In wireless sensor networks most of the packets are scattered from sensor are directed toward sink nodes. Thus any sensor node can determine the direction of sensed data toward the sink inexplicitly. The purpose of this study is to prevent the extra overhead of packets in network and increase the energy efficiency and consequently increase the life time of network. Most of the propagated protocols in sensor network function accordingly. In this paper first we examine one of the propagated protocols, called directed diffusion then in order to support the mobility in the network. We develop this protocol by using node cooperation and clustering techniques. The modeling results show that this method with low overhead can increase the delivery rate significantly if the nodes move.
{"title":"Supporting of Mobility by Cooperation Nodes in the Wireless Sensor Network Routing","authors":"Miresmaeil Mirnabibaboli, M. Markosyan, H. Hejr","doi":"10.1109/ITNG.2013.128","DOIUrl":"https://doi.org/10.1109/ITNG.2013.128","url":null,"abstract":"In wireless sensor networks most of the packets are scattered from sensor are directed toward sink nodes. Thus any sensor node can determine the direction of sensed data toward the sink inexplicitly. The purpose of this study is to prevent the extra overhead of packets in network and increase the energy efficiency and consequently increase the life time of network. Most of the propagated protocols in sensor network function accordingly. In this paper first we examine one of the propagated protocols, called directed diffusion then in order to support the mobility in the network. We develop this protocol by using node cooperation and clustering techniques. The modeling results show that this method with low overhead can increase the delivery rate significantly if the nodes move.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128114951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. N. Goh, Yoke Yie Chen, F. Lai, Stephanie Cristal Daud, A. Sivaji, Shi-Tzuaan Soo
Customer's perceived trust towards an e-commerce Web site is crucial for the success of online business. Effective design of Web interfaces increases perceived trust of customers. Given many associated usability issues when performing tasks on a Web site, it is important for technopreneurs embarking on online business to understand issues related to usability problems of an e-commerce Web site and the techniques to identify these issues. In this study, usability evaluation was performed on an online gift shop with a group of potential consumers with age range of 18-22. Four different evaluation methods were used: Feedback Capture after Task (FCAT), Retrospective Think Aloud (RTA), Retrospective Think Aloud with Eye Movement (RTE) and observation. This study reveals that the major defects found were language and content, user guidance and support, flexibility and control, and visual clarity. Therefore, this study suggest that applying good user interface design could provide better user experience and thus increase perceived trust and user satisfaction towards the Web site.
{"title":"A Comparison of Usability Testing Methods for an E-Commerce Website: A Case Study on a Malaysia Online Gift Shop","authors":"K. N. Goh, Yoke Yie Chen, F. Lai, Stephanie Cristal Daud, A. Sivaji, Shi-Tzuaan Soo","doi":"10.1109/ITNG.2013.129","DOIUrl":"https://doi.org/10.1109/ITNG.2013.129","url":null,"abstract":"Customer's perceived trust towards an e-commerce Web site is crucial for the success of online business. Effective design of Web interfaces increases perceived trust of customers. Given many associated usability issues when performing tasks on a Web site, it is important for technopreneurs embarking on online business to understand issues related to usability problems of an e-commerce Web site and the techniques to identify these issues. In this study, usability evaluation was performed on an online gift shop with a group of potential consumers with age range of 18-22. Four different evaluation methods were used: Feedback Capture after Task (FCAT), Retrospective Think Aloud (RTA), Retrospective Think Aloud with Eye Movement (RTE) and observation. This study reveals that the major defects found were language and content, user guidance and support, flexibility and control, and visual clarity. Therefore, this study suggest that applying good user interface design could provide better user experience and thus increase perceived trust and user satisfaction towards the Web site.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127006239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Testing techniques for database applications typically include generation of database states (synthetic data) along with automatic generation of test cases. The quality of such test cases is evaluated on the basis of structural coverage of the host language (e.g., Java), whereas, the quality of test cases for the embedded language (e.g., SQL) is evaluated separately using mutation testing. In mutation testing, several mutants or variants of the original SQL query are generated and mutation score is calculated. It is the percentage of mutants that can be differentiated in terms of their results using the given test cases. Higher mutation score indicates higher quality of the test cases. In existing approaches the generated test cases achieve high structural coverage with respect to the generated synthetic data, but suffer from low mutation score with respect to the same data. We present a novel framework called textit{SynConSMutate} for test case and synthetic data generation for database applications. The generated test cases with respect to the newly generated synthetic data ensure high quality not only in terms of coverage of code written in the host language, but also in terms of mutant detection of the queries written in the embedded language.
{"title":"SynConSMutate: Concolic Testing of Database Applications via Synthetic Data Guided by SQL Mutants","authors":"Tanmoy Sarkar, Samik Basu, Johnny S. K. Wong","doi":"10.1109/ITNG.2013.54","DOIUrl":"https://doi.org/10.1109/ITNG.2013.54","url":null,"abstract":"Testing techniques for database applications typically include generation of database states (synthetic data) along with automatic generation of test cases. The quality of such test cases is evaluated on the basis of structural coverage of the host language (e.g., Java), whereas, the quality of test cases for the embedded language (e.g., SQL) is evaluated separately using mutation testing. In mutation testing, several mutants or variants of the original SQL query are generated and mutation score is calculated. It is the percentage of mutants that can be differentiated in terms of their results using the given test cases. Higher mutation score indicates higher quality of the test cases. In existing approaches the generated test cases achieve high structural coverage with respect to the generated synthetic data, but suffer from low mutation score with respect to the same data. We present a novel framework called textit{SynConSMutate} for test case and synthetic data generation for database applications. The generated test cases with respect to the newly generated synthetic data ensure high quality not only in terms of coverage of code written in the host language, but also in terms of mutant detection of the queries written in the embedded language.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132183970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Beron, G. Montejano, D. Riesco, P. Henriques, N. Debnath
Understanding a web application is not a simple task. It implies being available to interpret both their descriptions and several systems that really implement the web services. This interpreting process gathers much information and this information must be properly shown for simplifying the understanding. The descriptions of web services are an important starting point to begin to comprehend a web services. They are significant because they offer hints about the web services complexity. The web services complexity can be measured at high level abstraction considering the number of: Services, Ports, Operations, Bindings, etc. In order to carry out the task previously mentioned, the source code of web service description must be analyzed and the information must be properly displayed to the user. In this paper SIP, a Simple Inspection Tool, is described. SIP applies compilation techniques for extracting information from web services and then it computes a set of simple metrics. These metrics are used for providing an idea about web service complexity from its description. Furthermore, SIP generates visualizations based on charts, texts and source codes to help to comprehend WSDL descriptions.
{"title":"SIP: A Simple Tool for Inspecting and Evaluating WSDL Specifications","authors":"M. Beron, G. Montejano, D. Riesco, P. Henriques, N. Debnath","doi":"10.1109/ITNG.2013.10","DOIUrl":"https://doi.org/10.1109/ITNG.2013.10","url":null,"abstract":"Understanding a web application is not a simple task. It implies being available to interpret both their descriptions and several systems that really implement the web services. This interpreting process gathers much information and this information must be properly shown for simplifying the understanding. The descriptions of web services are an important starting point to begin to comprehend a web services. They are significant because they offer hints about the web services complexity. The web services complexity can be measured at high level abstraction considering the number of: Services, Ports, Operations, Bindings, etc. In order to carry out the task previously mentioned, the source code of web service description must be analyzed and the information must be properly displayed to the user. In this paper SIP, a Simple Inspection Tool, is described. SIP applies compilation techniques for extracting information from web services and then it computes a set of simple metrics. These metrics are used for providing an idea about web service complexity from its description. Furthermore, SIP generates visualizations based on charts, texts and source codes to help to comprehend WSDL descriptions.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133732851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
jHISC is an object-oriented processor with RISC core and architectural support for object instructions. It is a three-addressing machine instead of a stack machine as JVM. With instruction folding techniques, several JVM operations could be translated into fewer or one jHISC three-address machine code, and they execute more effectively. This paper presents an improved folding algorithm for jHISC V4.0 in which the bytecodes are divided into six types and treat the intermediate operation result as P type operations and our instruction folding algorithm is further implemented in hardware level to further reduce the translation burden in software level.
{"title":"Advanced Instruction Folding for an Object-oriented Processor","authors":"A. Fong, C. Yau, Yijun Liu","doi":"10.1109/ITNG.2013.136","DOIUrl":"https://doi.org/10.1109/ITNG.2013.136","url":null,"abstract":"jHISC is an object-oriented processor with RISC core and architectural support for object instructions. It is a three-addressing machine instead of a stack machine as JVM. With instruction folding techniques, several JVM operations could be translated into fewer or one jHISC three-address machine code, and they execute more effectively. This paper presents an improved folding algorithm for jHISC V4.0 in which the bytecodes are divided into six types and treat the intermediate operation result as P type operations and our instruction folding algorithm is further implemented in hardware level to further reduce the translation burden in software level.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132904391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The conventional Linear Programming (LP) model requires the parameters to be known as constants. In the real world, however, the parameters are seldom known exactly and have to be estimated. Interval programming is one of the tools to tackle uncertainty in mathematical programming models. In this paper, we consider LP problem whose coefficients are uncertain. The relations between closed and bounded intervals is derived, and the solution of such a problem is proposed by considering the partial orderings on the set of all closed intervals.
{"title":"Linear Programming with Fuzzy Objective Function","authors":"I. Alolyan","doi":"10.1109/ITNG.2013.123","DOIUrl":"https://doi.org/10.1109/ITNG.2013.123","url":null,"abstract":"The conventional Linear Programming (LP) model requires the parameters to be known as constants. In the real world, however, the parameters are seldom known exactly and have to be estimated. Interval programming is one of the tools to tackle uncertainty in mathematical programming models. In this paper, we consider LP problem whose coefficients are uncertain. The relations between closed and bounded intervals is derived, and the solution of such a problem is proposed by considering the partial orderings on the set of all closed intervals.","PeriodicalId":320262,"journal":{"name":"2013 10th International Conference on Information Technology: New Generations","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129309262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}