1,229 results
Search Results
2. Race Relations in America: Surveys and Papers from the Amistad Research Center, 1943-1970.
- Author
-
Pan, D.
- Subjects
COMPUTER network resources ,ELECTRONIC information resources ,RACE relations - Abstract
The article offers information on the Race Relations in America: Surveys and Papers from the Amistad Research Center, 1943-1970 from publishing firm Adam Matthew.
- Published
- 2017
3. The Prize Papers Online 1: American Revolutionary War and Fourth Anglo-Dutch War.
- Author
-
Erlandson, R. J.
- Subjects
AMERICAN Revolutionary War, 1775-1783 ,ANGLO-Dutch War, 1780-1784 ,COMPUTER network resources - Abstract
The article reviews the web site The Prize Papers Online 1: American Revolutionary War and Fourth Anglo-Dutch War, located at http://primarysources.brillonline.com/, from the publishing house Brill.
- Published
- 2015
- Full Text
- View/download PDF
4. The Making of Modern Law: American Civil Liberties Union Papers, 1912-1990.
- Author
-
Scott, E. B.
- Subjects
AMERICAN law ,COMPUTER network resources - Abstract
The article reviews the Internet resource "Making of Modern Law: American Civil Liberties Union Papers" from publisher Gale which features American Civil Liberties Union (ACLU) papers on treaties, and trials.
- Published
- 2017
5. System for Automated Geoscientific Analyses (SAGA) v. 2.1.4.
- Author
-
Conrad, O., Bechtel, B., Bock, M., Dietrich, H., Fischer, E., Gerlitz, L., Wehberg, J., Wichmann, V., and Böhner, J.
- Subjects
GEOGRAPHIC information systems ,EARTH sciences ,DIGITAL elevation models ,REMOTE sensing ,GRAPHICAL user interfaces ,DATA visualization ,COMPUTERS in earth sciences ,COMPUTER network resources - Abstract
The System for Automated Geoscientific Analyses (SAGA) is an open-source Geographic Information System (GIS), mainly licensed under the GNU General Public License. Since its first release in 2004, SAGA has rapidly developed from a specialized tool for digital terrain analysis to a comprehensive and globally established GIS platform for scientific analysis and modeling. SAGA is coded in C++ in an object oriented design and runs under several operating systems including Windows and Linux. Key functional features of the modular organized software architecture comprise an application programming interface for the development and implementation of new geoscientific methods, an easily approachable graphical user interface with many visualization options, a command line interpreter, and interfaces to scripting and low level programming languages like R and Python. The current version 2.1.4 offers more than 700 tools, which are implemented in dynamically loadable libraries or shared objects and represent the broad scopes of SAGA in numerous fields of geoscientific endeavor and beyond. In this paper, we inform about the system's architecture, functionality, and its current state of development and implementation. Further, we highlight the wide spectrum of scientific applications of SAGA in a review of published studies with special emphasis on the core application areas digital terrain analysis, geomorphology, soil science, climatology and meteorology, as well as remote sensing. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
6. The Making of Modern Law: American Civil Liberties Union Papers, 1912–1990.
- Author
-
Verma, Henrietta
- Subjects
COMPUTER network resources ,HISTORY - Abstract
The article reviews the website database "The Making of Modern Law: American Civil Liberties Union Papers, 1912-1990" from the Gale firm Cengage Learning, located at http://www.gale.com/moml-aclu-papers.
- Published
- 2017
7. Paper-Based Survivorship Care Plans May be Less Helpful for Cancer Patients Who Search for Disease-Related Information on the Internet: Results of the Registrationsystem Oncological Gynecology (ROGY) Care Randomized Trial.
- Author
-
Nicolaije, Kim A. H., Ezendam, Nicole P. M., Pijnenborg, Johanna M. A., Boll, Dorry, Vos, Maria Caroline, Kruitwagen, Roy F. P. M., van de Poll-Franse, Lonneke V., Nicolaije, Kim Ah, Ezendam, Nicole Pm, Pijnenborg, Johanna Ma, and Kruitwagen, Roy Fpm
- Subjects
CANCER patients ,INTERNET in medicine ,CANCER treatment ,CANCER ,MEDICAL care use ,HEALTH behavior ,COMPUTER network resources ,COMMUNICATION ,COMPARATIVE studies ,FEMALE reproductive organ tumors ,INDUSTRIES ,INTERNET ,RESEARCH methodology ,MEDICAL cooperation ,MEDICAL informatics ,MEDICAL protocols ,RESEARCH ,SURVIVAL ,EVALUATION research ,RANDOMIZED controlled trials ,TUMOR treatment - Abstract
Background: The Institute of Medicine recommends Survivorship Care Plans (SCPs) for all cancer survivors. However, it is unclear whether certain patient groups may or may not benefit from SCPs.Objective: The aim was to assess whether the effects of an automatically generated paper SCP on patients' satisfaction with information provision and care, illness perceptions, and health care utilization were moderated by disease-related Internet use.Methods: Twelve hospitals were randomized to either SCP care or usual care in the pragmatic cluster randomized Registrationsystem Oncological GYnecology (ROGY) Care trial. Newly diagnosed endometrial cancer patients completed questionnaires after diagnosis (N=221; response: 74.7%, 221/296), 6 months (n=158), and 12 months (n=147), including patients' satisfaction with information provision and care, illness perceptions, health care utilization (how many times patients visited a medical specialist or primary care physician about their cancer in the past 6 months), and disease-related Internet use (whether patients used the Internet to look for information about cancer).Results: In total, 80 of 221 (36.2%) patients used the Internet to obtain disease-related information. Disease-related Internet use moderated the SCP care effect on the amount of information received about the disease (P=.03) and medical tests (P=.01), helpfulness of the information (P=.01), and how well patients understood their illness (P=.04). All stratified analyses were not statistically significant. However, it appeared that patients who did not seek disease-related information on the Internet in the SCP care arm reported receiving more information about their disease (mean 63.9, SD 20.1 vs mean 58.3, SD 23.7) and medical tests (mean 70.6, SD 23.5 vs mean 64.7, SD 24.9), finding the information more helpful (76.7, SD 22.9 vs mean 67.8, SD 27.2; scale 0-100), and understanding their illness better (mean 6.6, SD 3.0 vs mean 6.1, SD 3.2; scale 1-10) than patients in the usual care arm did. In addition, although all stratified analyses were not significant, patients who did seek disease-related information on the Internet in the SCP care arm appeared to receive less information about their disease (mean 65.7, SD 23.4 vs mean 67.1, SD 20.7) and medical tests (mean 72.4, SD 23.5 vs mean 75.3, SD 21.6), did not find the information more helpful (mean 78.6, SD 21.2 vs mean 76.0, SD 22.0), and reported less understanding of their illness (mean 6.3, SD 2.8 vs mean 7.1, SD 2.7) than patients in the usual care arm did.Conclusions: Paper SCPs appear to improve the amount of information received about the disease and medical tests, the helpfulness of the information, and understanding of the illness for patients who do not search for disease-related information on the Internet. In contrast, paper SCPs do not seem beneficial for patients who do seek disease-related information on the Internet.Trial Registration: ClinicalTrials.gov NCT01185626; https://clinicaltrials.gov/ct2/show/NCT01185626 (Archived by WebCite at http://www.webcitation.org/6fpaMXsDn). [ABSTRACT FROM AUTHOR]- Published
- 2016
- Full Text
- View/download PDF
8. The Selected papers of John Jay.
- Author
-
Danowitz, E. S.
- Subjects
MANUSCRIPTS ,COMPUTER network resources - Abstract
The article reviews the web site The Selected Papers of John Jay edited by Elizabeth M. Nuxoll, located at http://www.upress.virginia.edu/rotunda/.
- Published
- 2015
- Full Text
- View/download PDF
9. ExaPRR: A Framework for Support Dynamic and Interactive Events on Distributed Published Resource Repositories Mechanism in Distributed Exascale Computing Systems.
- Author
-
Khoshrooynemati, Tayebeh and Khaneghah, Ehsan Mousavi
- Subjects
COMPUTER systems ,SOFTWARE frameworks ,TECHNOLOGY ,COMPUTER network resources ,INSTITUTIONAL repositories - Abstract
This paper introduces the ExaPRR Framework, which is capable of managing and controlling dynamic and interactive events in addition to activities related to distributed Published Resources Repository, managing and controlling dynamic and interactive events of the said resource discovery (RD) by redefining the concept of request and response based on wave model. For this purpose, while analyzing the function of the Distributed Published Resource Repository RD and defining the concept of the next element participating in the global activity in this RD, it redefines the concept of request in the Distributed Exascale systems. This framework uses the concept of revising the state of implementation of dynamic and interactive events in the system and redefining the concept of request at every moment of the process of implementation of resource discovery activities based on system status, demanding requests, and dynamic and interactive event, manages the resource's discovery activities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Research in electronic publishing field: A scientometric assessment of publications output during 2005-14.
- Author
-
Dhawan, S. M., Gupta, B. M., and Gupta, Ritu
- Subjects
ELECTRONIC publishing ,SCIENTOMETRICS ,PUBLICATIONS ,COMPUTER network resources - Abstract
The paper presents an analytical study of the research output in e-publishing field on a series of scientometric indicators. As seen from Scopus database the total world output was 7010 publications published in 10 years during 2005-2014. The study found that e-publishing is still a young subject field growing at a slow pace, 3.41% CAGR growth and averaged 1.08 citations per paper. The body of research literature in this field is still in the early stage of its growth. Publication scatter in this field is still very high. The top 15 most productive organizations accounted for as small global publication share as 5.72% and as small global citation share as 12.73% during 2005-14. The average productivity rate per organization in 10 years was as low as 26.7, citation impact per paper was 2.41, h-index was 6.93 and international collaborative share as 23.44% during 2005-14. To build top research centres in e-publishing field, it is important that funding agencies at national and international level should aggressively start providing planned funding support to research organizations. [ABSTRACT FROM AUTHOR]
- Published
- 2016
11. Computer Card Games in Computer Science Education: A 10-Year Review.
- Author
-
Kordaki, Maria and Gousiou, Anthi
- Subjects
CARD games ,COMPUTER science education ,ELECTRONIC data processing ,COMPUTER simulation ,DATABASES ,COMPUTER network resources - Abstract
This paper presents a 10-year review study that focuses on the investigation of the use of computer card games (CCGs) as learning tools in Computer Science (CS) Education. Specific search terms keyed into 10 large scientific electronic databases identified 24 papers referring to the use of CCGs for the learning of CS matters during the last decade. The findings revealed that the CCGs reported by the reviewed papers were used for the learning of diverse CS issues. The motivation behind the use of the aforementioned CCGs was based on: (a) students' familiarity with the CGs at hand, so that they might focus on the construction of their simulation, (b) the fact that, the logic of CGs is suitable for the teaching of various CS concepts, and (c) CCG-play as a motivational activity to engage learners in their learning. CCGs were used in two ways: as CCG-construction context based on supportive data provided by educators, and as CCG-play educational tools. The constructivist learning approach was implied behind the design and use of most of the CCGs reported in the articles reviewed. Evaluation of some CCGs also provided positive results. [ABSTRACT FROM AUTHOR]
- Published
- 2016
12. Research for Practice: Private Online Communication; Highlights in Systems Verification.
- Author
-
Bailis, Peter, Kwon, Albert, and Wilcox, James R.
- Subjects
INTERPERSONAL communication ,COMPUTER network resources ,VERIFICATION of computer systems - Abstract
The authors present research papers regarding the use of cryptography to ensure private online communication and advances in systems verification or verified systems design.
- Published
- 2018
- Full Text
- View/download PDF
13. A Comprehensive Reliability Analysis Framework for NTC Caches: A System to Device Approach.
- Author
-
Gebregiorgis, Anteneh, Bishnoi, Rajendra, and Tahoori, Mehdi B.
- Subjects
ENERGY consumption ,INTEGRATED circuit design ,RELIABILITY in engineering ,AGING ,SOFT errors ,CACHE memory ,COMPUTER network resources - Abstract
Near threshold computing (NTC) has significant role in reducing the energy consumption of modern very large scale integrated circuits designs. However, NTC designs suffer from functional failures and performance loss. Understanding the characteristics of the functional failures and variability effects is of decisive importance in order to mitigate them, and get the utmost NTC benefits. This paper presents a comprehensive cross-layer reliability analysis framework to assess the effect of soft error, aging, and process variation in the operation of near threshold voltage caches. The objective is to quantify the reliability of different SRAM designs, evaluate voltage scaling potential of caches, and to find a reliability-performance optimal cache organization for an NTC microprocessor. In this paper, the soft error rate (SER) and static noise margin (SNM) of 6T and 8T SRAM cells and their dependencies on aging and process variation are investigated by considering device, circuit, and architecture level analysis. Their experimental results show that in NTC, process variation and aging-induced SNM degradation is $2.5{\boldsymbol \times }$ higher than in the super threshold domain while SER is $8{\boldsymbol \times }$ higher. At NTC, the use of 8T instead of 6T SRAM cells can reduce the system-level SNM and SER by 14% and 22%, respectively. Besides, we observe that we can find the right balance between performance and reliability by using an appropriate cache organization at NTC which is different from the super threshold. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
14. IEEE Transactions on Robotics information for authors.
- Subjects
MANUSCRIPTS ,INFORMATION resources management ,COPYRIGHT ,COMPUTER network resources - Abstract
The article offers information about the journal including the submission of manuscripts and multimedia material, copyright and the publication of information through an electronic form.
- Published
- 2016
- Full Text
- View/download PDF
15. Guest Editorial: A Special Issue in Physical Design for Big Data Warehousing and Mining.
- Author
-
Bellatreche, Ladjel, Furtado, Pedro, and Mohania, Mukesh
- Subjects
DATA warehousing ,DATA mining ,INDEXING digital resources ,SEARCH algorithms ,SQL ,OLAP technology ,COMPUTER network resources - Published
- 2016
- Full Text
- View/download PDF
16. The Study of Pallet Pooling Information Platform Based on Cloud Computing.
- Author
-
Li, Jia-bin, He, Shi-wei, and Yin, Wei-chuan
- Subjects
PALLETS (Shipping, storage, etc.) ,CLOUD computing ,MATERIALS handling ,SOFTWARE as a service ,INFORMATION networks ,COMPUTER network resources - Abstract
Effective implementation of pallet pooling system needs a strong information platform to support. Through the analysis of existing pallet pooling information platform (PPIP), the paper pointed out that the existing studies of PPIP are mainly based on traditional IT infrastructures and technologies which have software, hardware, resource utilization, and process restrictions. Because of the advantages of cloud computing technology like strong computing power, high flexibility, and low cost which meet the requirements of the PPIP well, this paper gave a PPIP architecture of two parts based on cloud computing: the users client and the cloud services. The cloud services include three layers, which are IaaS, PaaS, and SaaS. The method of how to deploy PPIP based on cloud computing is proposed finally. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
17. RESEARCH GALORE!
- Subjects
UNITED States education system ,RESEARCH papers (Students) ,SCHOLARS ,COMPUTER network resources - Abstract
The article offers information on a website located at Academia.edu for academics in the U.S. to share research papers.
- Published
- 2015
18. Review of Survey activities 2015.
- Author
-
Christiansen, Flemming G.
- Subjects
WEB portals ,GEOLOGY ,COMPUTER network resources - Abstract
The article discusses various topics published within the issue including one on a WebGIS portal for exploring geothermal energy, one on the levels of radioactivity on Mors and Bornholm and another on the creation of a basin model for southern Scandinavia.
- Published
- 2016
19. Sony launches crowdfunding site, e-paper remote control.
- Author
-
Hornyak, Tim
- Subjects
CROWD funding ,COMPUTER network resources - Abstract
The article offers brief information on the First Flight, crowdfunding and e-commerce website from electronics manufacturer Sony Corp.
- Published
- 2015
20. The Global Packing Number of a Fat-Tree Network.
- Author
-
Lo, Yuan-Hsun, Zhang, Yijin, Chen, Yi, Fu, Hung-Lin, and Wong, Wing Shing
- Subjects
COMPUTER network resources ,DATA structures ,ROUTING (Computer network management) ,DATA libraries ,TREE graphs - Abstract
Data centers play an important role in today’s Internet development. Research to find scalable architecture and efficient routing algorithms for data center networks has gained popularity. The fat-tree architecture, which is essentially a folded version of a Clos network, has proved to be readily implementable and is scalable. In this paper, we investigate routing on a fat-tree network by deriving its global packing number and by presenting explicit algorithms for the construction of optimal, load-balanced routing solutions. Consider an optical network that employs wavelength division multiplexing in which every user node sets up a connection with every other user node. The global packing number is basically the number of wavelengths required by the network to support such a traffic load, under the restriction that each source-to-destination connection is assigned a wavelength that remains constant in the network. In mathematical terms, consider a bidirectional, simple graph, G and let N\subseteq V(G) be a set of nodes. A path system \mathcal P of G with respect to N consists of |N|(|N|-1) directed paths, one path to connect each of the source-destination node pairs in N . The global packing number of a path system , denoted by \Phi (G,N,\mathcal {P}) , is the minimum integer k to guarantee the existence of a mapping \phi :\mathcal P\to \1,2,\ldots, k\ , such that \phi (P)\neq \phi (\widehat P) if P and \widehat {P} have common arc(s). The global packing number of (G,N) , denoted by \Phi (G,N) , is defined to be the minimum \Phi (G,N,\mathcal {P}) among all possible path systems \mathcal {P} . In additional to wavelength division optical networks, this number also carries significance for networks employing time division multiple access. In this paper, we compute by explicit route construction the global packing number of (\text Tn,N) , where Tn denotes the topology of the n -ary fat-tree network, and $N$ is considered to be the set of all edge switches or the set of all supported hosts. We show that the constructed routes are load-balanced and require minimal link capacity at all network links. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
21. IGAPS: A Taxonomy and Facet Classification System.
- Author
-
Pell, John and Huppuch, Meghan
- Subjects
TAXONOMY ,INFORMATION resources management ,INDEXING ,INFORMATION science ,BIOINFORMATICS ,COMPUTER network resources - Abstract
This paper describes an assessment of the information management practices at International Planned Parenthood Federation/Western Hemisphere Region and the development and implementation of an information management pilot for that organization. The pilot included the development of a taxonomy to classify the organization's documents, training in basic citation practices, and a decentralized model for building an organized library of documents within the citation management software Mendeley. The authors discuss the pilot's taxonomy within the context of literature on taxonomy development and offers strategic recommendations for improving the information management practices of not-for-profit organizations that lack dedicated information management staff. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
22. Synchronization of Generalized Using to Image Encryption.
- Author
-
Li, Guodong, Yang, Bing, Pu, Yue, and Xu, Wenxia
- Subjects
IMAGE transmission ,IMAGE encryption ,SYNCHRONIZATION ,DIGITAL image processing ,CELLULAR neural networks (Computer science) ,CHAOS theory ,COMPUTER network resources - Abstract
The problem of the secure transmission of digital image has paid more and more attention to the network and this paper designs a special image encryption scheme. Image encryption scheme is designed based on the hyper chaos of generalized five-order Henon mapping and five-order cellular neural network (CNN) system. Firstly, the chaotic sequence , which is regarded as the initial conditions of CNN system, is generated by the five-order generalized Henon mapping. Then another chaotic sequence is produced by the CNN system. At last, the cipher image is generated by the transformation of random sequence and the original image. Toward the end, the paper makes the simulation experiment and draws a conclusion that the algorithm of image encryption has strong attack resistance, good safety, and suitable to spread in the network through analyzing the statistical characteristics of the image information entropy, correlation and histogram as well as the key space and the sensitivity. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
23. Facilitating Scientometrics in Learning Analytics and Educational Data Mining – the LAK Dataset.
- Author
-
Dietze, Stefan, Taibi, Davide, and d'Aquin, Mathieu
- Subjects
LEARNING ,DATA acquisition systems ,LINKED data (Semantic Web) ,COMPUTER network resources - Abstract
The Learning Analytics and Knowledge (LAK) Dataset represents an unprecedented corpus which exposes a near complete collection of bibliographic resources for a specific research discipline, namely the connected areas of Learning Analytics and Educational Data Mining. Covering over five years of scientific literature from the most relevant conferences and journals, the dataset provides Linked Data about bibliographic metadata as well as full text of the paper body. The latter was enabled through special licensing agreements with ACM for publications not yet available through open access. The dataset has been designed following established Linked Data pattern, reusing established vocabularies and providing links to established schemas and entity coreferences in related datasets. Given the temporal and topic coverage of the dataset, being a near-complete corpus of research publications of a particular discipline, it facilitates scientometric investigations, for instance, about the evolution of a scientific field over time, or correlations with other disciplines, what is documented through its usage in a wide range of scientific studies and applications. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
24. All Roads Lead to Computing: Making, Participatory Simulations, and Social Computing as Pathways to Computer Science.
- Author
-
Brady, Corey, Orton, Kai, Weintrop, David, Anton, Gabriella, Rodriguez, Sebastian, and Wilensky, Uri
- Subjects
COMPUTER science ,SOCIAL computing ,COMPUTER simulation ,COMPUTER programming ,STUDENT-centered learning ,HARDWARE ,COMPUTER network resources - Abstract
Computer science (CS) is becoming an increasingly diverse domain. This paper reports on an initiative designed to introduce underrepresented populations to computing using an eclectic, multifaceted approach. As part of a yearlong computing course, students engage in Maker activities, participatory simulations, and computing projects that foreground the social and collaborative aspects of CS. Collectively, these activities are designed to introduce learners to the growing diversity of what CS looks like in the 21st century. This paper lays out the practical and theoretical motivations for the Computational Thinking for Girls (CT4G) project, specifically highlighting the use of Making through physical and social computing as ways to engage students in CS. A snapshot of one activity from the program is provided—Wearing the Web—in which students use open-hardware programmable badges to explore the underlying structure and technology that enables the Internet. Data from the first year of the CT4G program are presented to show the positive effects that this diverse introduction to CS is having on the students with respect to their attitudes toward CS. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
25. Business Information Exchange System with Security, Privacy, and Anonymity.
- Author
-
Muftic, Sead, bin Abdullah, Nazri, and Kounelis, Ioannis
- Subjects
BUSINESS information services ,INFORMATION sharing ,ANONYMITY ,INTERNET security ,EMAIL privacy ,INSTANT messaging ,COMPUTER network resources ,SECURITY systems - Abstract
Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
26. On-the-Fly Nearest-Shelter Computation in Event-Dependent Spatial Networks in Disasters.
- Author
-
Tsai, Pei-Hsuan, Lin, Chun-Lung, and Liu, Jyun-Nan
- Subjects
EMERGENCY management ,EMERGENCY management -- Communication systems ,ROBOTIC path planning ,QUERYING (Computer science) ,APPROXIMATION algorithms ,MOBILE communication systems ,COMPUTER network resources - Abstract
Numerous approaches have been proposed to solve shortest path query problems (SPQPs) in either static or time-dependent spatial networks; however, these approaches are neither appropriately nor efficiently used to find the nearest shelter with fastest paths in disaster evacuations. In disasters, segments of a path computed and saved as the fastest might become impassable. The nearest shelter differs for people depending on their locations and can also change on the basis of an unpredictable and highly dynamic edge cost (e.g., maximum passable vehicle speed), which is influenced by disaster events. To solve this problem, this paper proposes a dynamic network model, which is called an event-dependent network, to represent a spatial network in a disaster. Effective approaches using multiple algorithms are proposed for on-the-fly computation of the nearest shelter and fastest paths in a disaster. A distributed system consisting of a server and multiple mobile clients using our approaches is presented for navigating the fastest paths for people to evacuate a disaster area. Real-world maps, such as a map of California, were used in our experiments. The results revealed that our approaches require less than 2 ms to find a new nearest shelter and its fastest paths, which is faster than other approaches for solving the fastest-path problem. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
27. OUT OF PRINT.
- Author
-
CHIASSON, DAN
- Subjects
WOMEN authors ,AMERICAN poetry ,19TH century American poetry ,COMPUTER network resources - Abstract
The article discusses the preservation of poems written on scavenged paper by Emily Dickinson published in the collections "The Gorgeous Nothings" and "Envelope Poems" and available through the online Emily Dickinson Archive at Harvard University. Emphasis is given to topics such as Dickinson's poetry in the archives of Amherst College, the handwriting and punctuation of her manuscripts, and Dickinson's former residence in Amherst, Massachusetts.
- Published
- 2016
28. An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme.
- Author
-
Ou, Lu, Yin, Hui, Qin, Zheng, Xiao, Sheng, Yang, Guangyi, and Hu, Yupeng
- Subjects
LOCATION-based services ,CLOUD computing ,DATA encryption software ,COMPUTER network resources ,MAPS ,RIGHT of privacy ,MANAGEMENT - Abstract
Location-based services (LBSs) are increasingly popular in today’s society. People reveal their location information to LBS providers to obtain personalized services such as map directions, restaurant recommendations, and taxi reservations. Usually, LBS providers offer user privacy protection statement to assure users that their private location information would not be given away. However, many LBSs run on third-party cloud infrastructures. It is challenging to guarantee user location privacy against curious cloud operators while still permitting users to query their own location information data. In this paper, we propose an efficient privacy-preserving cloud-based LBS query scheme for the multiuser setting. We encrypt LBS data and LBS queries with a hybrid encryption mechanism, which can efficiently implement privacy-preserving search over encrypted LBS data and is very suitable for the multiuser setting with secure and effective user enrollment and user revocation. This paper contains security analysis and performance experiments to demonstrate the privacy-preserving properties and efficiency of our proposed scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
29. Weighted Domain Transfer Extreme Learning Machine and Its Online Version for Gas Sensor Drift Compensation in E-Nose Systems.
- Author
-
Ma, Zhiyuan, Luo, Guangchun, Qin, Ke, Niu, Weina, and Wang, Nan
- Subjects
ELECTRONIC noses ,MACHINE learning ,PERFORMANCE of gas detectors ,SENSOR arrays ,COMPUTER network resources - Abstract
Machine learning approaches have been widely used to tackle the problem of sensor array drift in E-Nose systems. However, labeled data are rare in practice, which makes supervised learning methods hard to be applied. Meanwhile, current solutions require updating the analytical model in an offline manner, which hampers their uses for online scenarios. In this paper, we extended Target Domain Adaptation Extreme Learning Machine (DAELM_T) to achieve high accuracy with less labeled samples by proposing a Weighted Domain Transfer Extreme Learning Machine, which uses clustering information as prior knowledge to help select proper labeled samples and calculate sensitive matrix for weighted learning. Furthermore, we converted DAELM_T and the proposed method into their online learning versions under which scenario the labeled data are selected beforehand. Experimental results show that, for batch learning version, the proposed method uses around 20% less labeled samples while achieving approximately equivalent or better accuracy. As for the online versions, the methods maintain almost the same accuracies as their offline counterparts do, but the time cost remains around a constant value while that of offline versions grows with the number of samples. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
30. Hub of medical expertise or medicalised conveyor-belt? Sharing meanings online on the hospital birth setting.
- Author
-
Fage-Butler, Antoinette
- Subjects
CHILDBIRTH ,INTERNET forums ,HOSPITAL birthing centers ,COMPUTER network resources - Abstract
In 2014, the official risk advice in the UK regarding birth setting was altered given scientific evidence that for low-risk groups, home births are safer than hospital births. As hospital births were previously the de facto recommendation, and pregnant women in the UK now need to consider their birth setting options carefully, many go online, seeking advice about birth setting options from their peers. In this paper, I investigate how the hospital birth setting is constructed on an online forum where women seek advice on the relative merits of various birth settings, analysing posters' constructions of the hospital birth setting using Foucauldian discourse analysis. Findings reveal that the hospital birth setting is characterised either as the best and safest place to ensure safe delivery due to on-site biomedical experts and technology, or it is constructed as dehumanising, involving unnecessary intervention-related risks to mother and baby. The majority of the threads are critical of the hospital birth setting. Besides these findings, this paper contributes methodologically to the study of birth settings as it adopts a cultural approach supported by discourse analysis, illustrating the metapragmatic context within which birth setting decisions are made. As women's perspectives on the birth setting issue are in focus, findings regarding women's satisfaction with the various options are valuable for healthcare professionals who support women with birth setting decisions, as well as obstetric and maternity practitioners in the hospital setting. The extent of posters' critique of the hospital birth setting suggests the need for further research. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
31. The foundation of precision medicine: integration of electronic health records with genomics through basic, clinical, and translational research.
- Author
-
Ritchie, Marylyn D., de Andrade, Mariza, and Kuivaniemi, Helena
- Subjects
ELECTRONIC health records ,GENOMICS ,COMPUTER network resources - Abstract
An introduction is presented in which the editor discusses various reports within the issue on topics including the initial goal of the Electronic Medical Records and Genomics (eMERGE) network, the challenges involved in merging genotypes data from different eMERGE sites and issues of population stratification and genotype platform bias.
- Published
- 2015
- Full Text
- View/download PDF
32. The trouble with reference rot.
- Author
-
Perkel, Jeffrey M.
- Subjects
REPORT writing ,WEB archiving ,DATA replication ,HYPERLINKS ,WEBSITES ,WEB archives ,COMPUTER network resources - Abstract
The article focuses on broken hyperlink references in research papers (reference rot) and methods to combat this problem. It states online archiving services like the Internet Archive and Harvard Law School Library's web-archiving service Perma allow researchers to store permanent copies of webpages as they viewed it when preparing manuscripts. It talks about the web archive project Memento which provides users access to all saved version of the web page and allow access to web-at-large links.
- Published
- 2015
- Full Text
- View/download PDF
33. Track Everything: Limiting Prior Knowledge in Online Multi-Object Recognition.
- Author
-
Wong, Sebastien C., Stamatescu, Victor, Kearney, David, Lee, Ivan, McDonnell, Mark D., and Gatt, Adam
- Subjects
OBJECT recognition (Computer vision) ,TRACKING algorithms ,IMAGE ,EVALUATION ,DECISION making ,COMPUTER network resources - Abstract
This paper addresses the problem of online tracking and classification of multiple objects in an image sequence. Our proposed solution is to first track all objects in the scene without relying on object-specific prior knowledge, which in other systems can take the form of hand-crafted features or user-based track initialization. We then classify the tracked objects with a fast-learning image classifier, that is based on a shallow convolutional neural network architecture and demonstrate that object recognition improves when this is combined with object state information from the tracking algorithm. We argue that by transferring the use of prior knowledge from the detection and tracking stages to the classification stage, we can design a robust, general purpose object recognition system with the ability to detect and track a variety of object types. We describe our biologically inspired implementation, which adaptively learns the shape and motion of tracked objects, and apply it to the Neovision2 Tower benchmark data set, which contains multiple object types. An experimental evaluation demonstrates that our approach is competitive with the state-of-the-art video object recognition systems that do make use of object-specific prior knowledge in detection and tracking, while providing additional practical advantages by virtue of its generality. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
34. Multipumping Flexible DSP Blocks for Resource Reduction on Xilinx FPGAs.
- Author
-
Ronak, Bajaj and Fahmy, Suhaib A.
- Subjects
DIGITAL signal processing ,FIELD programmable gate arrays ,COMPUTER network resources ,DIGITAL communications - Abstract
For complex datapaths, resource sharing can help reduce area consumption. Traditionally, resource sharing is applied when the same resource can be scheduled for different uses in different cycles, often resulting in a longer schedule. Multipumping is a method whereby a resource is clocked at a frequency that is a multiple of the surrounding circuit, thereby offering multiple executions per global clock cycle. This allows a single resource to be shared among multiple uses in the same cycle. This concept maps well to modern field-programmable gate arrays (FPGAs), where hard macro blocks are typically capable of running at higher frequencies than most designs implemented in the logic fabric. While this technique has been demonstrated for static resources, modern digital signal processing (DSP) blocks are flexible, supporting varied operations at runtime. In this paper, we demonstrate multipumping for resource sharing of the flexible DSP48E1 macros in Xilinx FPGAs. We exploit their dynamic programmability to enable resource sharing for the full set of supported DSP block operations, and compare this to multipumping only multipliers and DSP blocks with fixed configurations. The proposed approach saves on average 48% DSP blocks at a cost of 74% more LUTs, effectively saving 30% equivalent LUT area and is feasible for the majority of designs, in which clock frequency is typically below half the maximum supported by the DSP blocks. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
35. Community Sensor Network for Monitoring Road Roughness Using Smartphones.
- Author
-
Kumar, Rajiv, Mukherjee, Abhijit, and Singh, V. P.
- Subjects
ROAD maintenance ,WIRELESS sensor networks ,GLOBAL Positioning System ,SURFACE roughness measurement ,FUZZY logic ,SMARTPHONES ,COMPUTER network resources - Abstract
Maintenance of ever-expanding road networks all over the world is a critical task and regular monitoring of the road surface is imperative for successful maintenance. Existing monitoring techniques use dedicated vehicles equipped with sensors. Limited availability of these specialized vehicles makes regular monitoring very challenging. This paper explores a novel approach of empowering the smartphone user community for monitoring roads that they use. Smartphones are used for sensing the road surface conditions from a moving vehicle. The system involves client applications on smartphones that collect accelerations as the users travel on the roads, processing of the information and communication to a central server, georeference database, and visualization of road conditions on Google maps. In this paper, the fuzzy logic--based road surface roughness classification is proposed for monitoring the road roughness. The implementation has been demonstrated in different road networks at northern region of India. The experiment demonstrates the huge potential of user community participation in maintenance of road infrastructure. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
36. Computer-Aided Identification and Validation of Intervenability Requirements.
- Author
-
Meis, Rene and Heisel, Maritta
- Subjects
COMPUTER-aided design ,COMPUTER software quality control ,PRIVACY ,COMPUTER network resources - Abstract
Privacy as a software quality is becoming more important these days and should not be underestimated during the development of software that processes personal data. The privacy goal of intervenability, in contrast to unlinkability (including anonymity and pseudonymity), has so far received little attention in research. Intervenability aims for the empowerment of end-users by keeping their personal data and how it is processed by the software system under their control. Several surveys have pointed out that the lack of intervenability options is a central privacy concern of end-users. In this paper, we systematically assess the privacy goal of intervenability and set up a software requirements taxonomy that relates the identified intervenability requirements with a taxonomy of transparency requirements. Furthermore, we provide a tool-supported method to identify intervenability requirements from the functional requirements of a software system. This tool-supported method provides the means to elicit and validate intervenability requirements in a computer-aided way. Our combined taxonomy of intervenability and transparency requirements gives a detailed view on the privacy goal of intervenability and its relation to transparency. We validated the completeness of our taxonomy by comparing it to the relevant literature that we derived based on a systematic literature review. The proposed method for the identification of intervenability requirements shall support requirements engineers to elicit and document intervenability requirements in compliance with the EU General Data Protection Regulation. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
37. How Do Selected National Funding Agencies Communicate the Concept of Cognitive Innovation on Their Public Website?
- Author
-
Nasser, Mona
- Subjects
RESEARCH grants ,COGNITIVE ability ,WEBSITES ,FINANCE ,COMPUTER network resources - Abstract
In this paper, I discuss how three funding agencies have presented or discussed the concept of cognitive innovation in formulating their research programs, calls or funding opportunities on their website. Gummerum and Denham recognize the association between the innovator, innovation and the contextual challenge of the concept of cognitive innovation and its impact on society (Gummerum & Denham, 2014). Research funders make decisions to allocate resources to certain research questions and not others. Researchers attempt to understand how these decisions are made and consider them in applying for funding to them. One of the information sources that researchers can use to inform what areas of research they can get funding for or how to formulate their research grants is the public information on the website of the funding agencies. In this paper, I only focus on the information presented on their website and not their internal processes or policies. The approach of funding agencies to present what is categorized as innovation or creativity has the potential to influence how researchers focus or frame their research. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
38. Incident-Supporting Visual Cloud Computing Utilizing Software-Defined Networking.
- Author
-
Gargees, Rasha, Morago, Brittany, Pelapur, Rengarajan, Chemodanov, Dmitrii, Calyam, Prasad, Oraibi, Zakariya, Duan, Ye, Palaniappan, Kannappan, and Seetharaman, Guna
- Subjects
NATURAL disasters ,STREAMING video & television ,CLOUD computing ,SOFTWARE-defined networking ,EXPERIENCE ,COMPUTER network resources - Abstract
In the event of natural or man-made disasters, providing rapid situational awareness through video/image data collected at salient incident scenes is often critical to the first responders. However, computer vision techniques that can process the media-rich and data-intensive content obtained from civilian smartphones or surveillance cameras require large amounts of computational resources or ancillary data sources that may not be available at the geographical location of the incident. In this paper, we propose an incident-supporting visual cloud computing solution by defining a collection, computation, and consumption (3C) architecture supporting fog computing at the network edge close to the collection/consumption sites, which is coupled with cloud offloading to a core computation, utilizing software-defined networking (SDN). We evaluate our 3C architecture and algorithms using realistic virtual environment test beds. We also describe our insights in preparing the cloud provisioning and thin-client desktop fogs to handle the elasticity and user mobility demands in a theater-scale application. In addition, we demonstrate the use of SDN for on-demand compute offload with congestion-avoiding traffic steering to enhance remote user quality of experience in a regional-scale application. The optimization between fogs computing at the network edge with core cloud computing for managing visual analytics reduces latency, congestion, and increases throughput. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
39. DATABASE RELEASES.
- Subjects
DATABASE evaluation ,BOOKS ,COMPUTER network resources - Abstract
The article evaluates various databases and online products released in 2016, including "American Civil Liberties Union Papers, 1912-1990," from Gale, "The Criminal Justice & Criminology Video Collection," from SAGE Knowledge and "Cancer Biology," from Annual Review.
- Published
- 2016
40. Research on Application of Artificial Intelligence in Computer Network Technology.
- Author
-
Wang, Qingjun and Lu, Peng
- Subjects
COMPUTER engineering ,ARTIFICIAL intelligence ,COMPUTER network resources ,BACK propagation ,ARTIFICIAL neural networks ,COMPUTER networks - Abstract
With the continuous expansion of the application scope of computer network technology, various malicious attacks that exist in the Internet range have caused serious harm to computer users and network resources. This paper attempts to apply artificial intelligence (AI) to computer network technology and research on the application of AI in computing network technology. Designing an intrusion detection model based on improved back propagation (BP) neural network. By studying the attack principle, analyzing the characteristics of the attack method, extracting feature data, establishing feature sets, and using the agent technology as the supporting technology, the simulation experiment is used to prove the improvement effect of the system in terms of false alarm rate, convergence speed, and false negative rate, the rate reached 86.7%. The results show that this fast algorithm reduces the training time of the network, reduces the network size, improves the classification performance, and improves the intrusion detection rate. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
41. Ultra-Fast Bloom Filters using SIMD Techniques.
- Author
-
Lu, Jianyuan, Wan, Ying, Li, Yang, Zhang, Chuwen, Dai, Huichen, Wang, Yi, Zhang, Gong, and Liu, Bin
- Subjects
INFORMATION filtering systems ,ENCODING ,NETWORK routers ,COMPUTER network resources ,MEMBERSHIP - Abstract
The network link speed is growing at an ever-increasing rate, which requires all network functions on routers/switches to keep pace. Bloom filter is a widely-used membership check data structure in networking applications. Correspondingly, it also faces the urgent demand of improving the performance in membership check speed. To this end, this paper proposes a new Bloom filter variant called Ultra-Fast Bloom Filters (UFBF), by leveraging the Single Instruction Multiple Data (SIMD) techniques. We make three improvements for UFBF to accelerate the membership check speed. First, we develop a novel hash computation algorithm which can compute multiple hash functions in parallel with the use of SIMD instructions. Second, we elaborate a Bloom filter’s bit-test process from sequential to parallel, enabling more bit-tests per unit time. Third, we improve the cache efficiency of membership check by encoding an element’s information to a small block so that it can fit into a cache-line. We further generalize UFBF, called c-UFBF, to make UFBF supporting large number of hash functions. Both theoretical analysis and extensive evaluations show that the UFBF greatly outperforms the state-of-the-art Bloom filter variants on membership check speed. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
42. Website Hosting Data and Analysis.
- Author
-
Ilgner, Petr, Komosný, Dan, and Rehman, Saeed Ur
- Subjects
WEB hosting ,PUBLIC sphere ,DATA analysis ,COMPUTER network resources ,STATISTICS - Abstract
We have collected a large dataset - more than 21 000 websites - through web-crawling the public resources of the Czech Internet. The proposed method for website hosting detection along with their geographic location and software were applied on the collected data to extend basic statistical information about the Czech websites published by the national domain registrar CZ.NIC. For analysis, we divided the data into nine categories to show differences between them, for example, between the public and private sector. The procedures used in this paper may also be applied for an extended analysis of websites in other countries, for example, for verification of fulfillment of legal directives to be implemented by public sector. [ABSTRACT FROM AUTHOR]
- Published
- 2019
43. Dynamic Resource Scheduling in Mobile Edge Cloud with Cloud Radio Access Network.
- Author
-
Wang, Xinhou, Wang, Kezhi, Wu, Song, Di, Sheng, Jin, Hai, Yang, Kun, and Ou, Shumao
- Subjects
RADIO access networks ,CLOUD computing ,CUSTOMER services ,CELL phones ,DYNAMICAL systems ,COMPUTER network resources - Abstract
Nowadays, by integrating the cloud radio access network (C-RAN) with the mobile edge cloud computing (MEC) technology, mobile service provider (MSP) can efficiently handle the increasing mobile traffic and enhance the capabilities of mobile devices. But the power consumption has become skyrocketing for MSP and it gravely affects the profit of MSP. Previous work often studied the power consumption in C-RAN and MEC separately while less work had considered the integration of C-RAN with MEC. In this paper, we present an unifying framework for the power-performance tradeoff of MSP by jointly scheduling network resources in C-RAN and computation resources in MEC to maximize the profit of MSP. To achieve this objective, we formulate the resource scheduling issue as a stochastic problem and design a new optimization framework by using an extended Lyapunov technique. Specially, because the standard Lyapunov technique critically assumes that job requests have fixed lengths and can be finished within each decision making interval, it is not suitable for the dynamic situation where the mobile job requests have variable lengths. To solve this problem, we extend the standard Lyapunov technique and design the VariedLen algorithm to make online decisions in consecutive time for job requests with variable lengths. Our proposed algorithm can reach time average profit that is close to the optimum with a diminishing gap (1/V) for the MSP while still maintaining strong system stability and low congestion. With extensive simulations based on a real world trace, we demonstrate the efficacy and optimality of our proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
44. TOWARDS AUTOMATIC PROCESSING OF VIRTUAL CITY MODELS FOR SIMULATIONS.
- Author
-
Piepereit, R., Schilling, A., Alam, N., Wewetzer, M., Pries, M., and Coors, V.
- Subjects
GEOGRAPHIC information systems ,AUTOMATIC control systems ,COMPUTER engineering -- Computer-aided design ,COMPUTER network resources - Abstract
Especially in the field of numerical simulations, such as flow and acoustic simulations, the interest in using virtual 3D models to optimize urban systems is increasing. The few instances in which simulations were already carried out in practice have been associated with an extremely high manual and therefore uneconomical effort for the processing of models. Using different ways of capturing models in Geographic Information System (GIS) and Computer Aided Engineering (CAE), increases the already very high complexity of the processing. To obtain virtual 3D models suitable for simulation, we developed a tool for automatic processing with the goal to establish ties between the world of GIS and CAE. In this paper we introduce a way to use Coons surfaces for the automatic processing of building models in LoD2, and investigate ways to simplify LoD3 models in order to reduce unnecessary information for a numerical simulation. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
45. Investigating Students 'Attitude towards E-Learning Model for Studying English in Delta University.
- Author
-
AlAdl, Abdelrahman E.
- Subjects
CLASSROOMS ,STUDENT attitudes ,COMPUTER network resources - Abstract
The purpose of this paper is to investigate students’ attitude towards an e-learning English model named Learn English Pathways ( LEP) . This course is assigned for freshmen students of Delta University, as a training material for accessing APTIS test. This research seeks answers for the following questions: 1. Does using e- learning software program influence students' attitude towards learning English as a foreign language positively? 2- What are the advantages of e learning in improving English language skills among freshmen students? To achieve the goals of the paper, a questionnaire was distributed to the subjects of this study. Its items aimed at eliciting whether the students think that using e- learning models enriched their learning process and made it easier or it had no effect on them. The population of this study was 100 of freshmen students at Delta University, during the academic year 2015- 2016. The students filled out a questionnaire and completed a course evaluation at the end of the experiment. The t-test scores were statistically evaluated. The findings of this paper reveal that LEP influences the students’ overall attitude towards English learning language. The different activities that are provided by LEP have been described with an analysis of how they can be used to develop EFL students’ language proficiency and self education. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
46. ACQUISITION OF 3D INFORMATION FOR VANISHED STRUCTURE BY USING ONLY AN ANCIENT PICTURE.
- Author
-
Kunii, Y. and Sakamoto, R.
- Subjects
THREE-dimensional modeling ,PICTURES ,CAMERA equipment ,COMPUTER network resources - Abstract
In order to acquire 3D information for reconstruction of vanished historical structure, grasp of 3D shape of such structure was attempted by using an ancient picture. Generally, 3D information of a structure is acquired by photogrammetric theory which requires two or more pictures. This paper clarifies that the geometrical information of the structure was obtained only from an ancient picture, and 3D information was acquired. This kind of method was applied for an ancient picture of the Old Imperial Theatre. The Old Imperial Theatre in the picture is constituted by two-point perspective. Therefore, estimated value of focal length of camera, length of camera to the Old Imperial Theatre and some parameters were calculated by estimation of field angle, using body height as an index of length and some geometrical information. Consequently, 3D coordinate of 120 measurement points on the surface of the Old Imperial Theatre were calculated respectively, and 3DCG modeling of the Old Imperial Theatre was realized. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
47. Using Laptops in the Writing Classroom: Applying Technology for Heuristic Learning.
- Author
-
Alkhatnai, Mubarak
- Subjects
CLASSROOM activities ,ENGLISH language education ,COMPUTER network resources - Abstract
It has been argued that there are enormous advantages to integrating laptops into foreign language teaching to help teachers and students become capable of communicating and collaborating with native and nonnative speakers around the globe. This paper aims at underscoring the advantages of using laptops in Teaching English as a Second Language classrooms. It investigates and elucidates different methods and practices that can help English language learners enhance their learning skills through using this technology as well as makes English teachers aware of strategies they can use effectively. Through examining various primary studies and prominent case studies, the paper identifies the shortcomings and inadequacies of the existing conventional English language learning tools. It is necessary for second language teaching to adapt and renew itself in order to be compatible with the globalized world. The paper establishes that the application of laptops is beneficial in providing a wealth of resources that allow students to become active learners by creating content for a worldwide audience. [ABSTRACT FROM AUTHOR]
- Published
- 2016
48. How to Manage and Plan Terminology: Creating Management TDBs.
- Author
-
Jakić, Gordana and Anđelković, Jelena
- Subjects
SCIENTIFIC terminology ,TERMS & phrases ,DATABASE management ,MANAGEMENT ,LANGUAGE planning ,KNOWLEDGE base ,SUBLANGUAGE ,LANGUAGE & languages ,COMPUTER network resources - Abstract
Scientific and technical terminology represents a very topical issue in economically and technologically dependent countries with small languages such as Serbian. The current terminological problems in the Serbian language, especially in specialized areas that are experiencing dynamic development, are: Anglicization of the language for special purposes, underdeveloped and unstable terminology, and lack of adequate and modern terminological and lexical resources. On the one hand, the terminological problems listed above are of concern to subject-field specialists, since inadequate and non-existent terminology significantly affects the representation, transfer and management of specialized knowledge and information. On the other hand, terminology and language planners point to the growing need for immediate and systematic intervention aimed at terminology harmonization, consolidation and standardization. In spite of the awareness, there is no systematic approach to the solving of terminological problems in Serbian. In addition, practical activities regarding the collection and organization of terminology are few and reduced to individual initiatives. Under the paradigm of language planning (LP)-oriented terminology management (2), this paper is going to address a practical activity of terminology management: the creation of a Serbian management terminology database (TDB) with equivalent terms in English. The paper will discuss the methodology of terminology work, potential obstacles in termbase creation, as well as potential benefits that such a resource would have on all its potential users: management specialists and practitioners, professional translators, and language and terminology planners. A particular focus will be placed on the potential significance that this kind of a database would have for terminology policy and planning in the Serbian language, on the one hand, and knowledge transfer and management, on the other hand. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
49. Some recent advances in automated analysis.
- Author
-
Ábrahám, Erika and Havelund, Klaus
- Subjects
COMPUTER systems ,AUTOMATION ,COMPUTER software research ,SATISFIABILITY (Computer science) ,ALGORITHM research ,SVG (Document markup language) ,COMPUTER network resources - Abstract
Due to the increasing complexity of software systems, there is a growing need for automated and scalable software synthesis and analysis. In the last decade, active research in the formal methods community brought interesting results and valuable tools. However, there are still challenges to face and hard problems that need to be solved. We briefly outline some recent trends, and review some of the latest achievements, introducing six papers selected from the 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2014). [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
50. Identifying Household Water Use through Transient Signal Classification.
- Author
-
Almeida, Giovana, Vieira, José, Sá Marques, Alfeu, Cardoso, Alberto, and Oswaldo Ludwig
- Subjects
PATTERN recognition systems ,SIGNAL processing ,MACHINE learning ,WATER use ,WATER management ,COMPUTER network resources - Abstract
The research reported in this paper aims to develop a household water use identification method through signal pattern analysis. An experimental facility was constructed to simulate bathroom and kitchen water use. The data acquisition system used a volumetric water meter with pulsed output, pressure transducers, data acquisition with a Universal Serial Bus interface interconnected with the Cyble sensor and a laptop computer. The data analysis was performed using a pattern recognition algorithm to identify the hydraulic fixtures in use. Five classes of water use were considered, as follows: (1) kitchen faucet (KF), (2) washbasin faucet (WF), (3) bidet (BD), (4) shower (SH), and (5) toilet flush (TF). Two algorithms were used to identify the best classifier for the data, as follows: (1) multilayer perceptron, and (2) support vector machine (SVM). The fusion by majority vote regarding the results of SVM in the time domain showed the best accuracy; 92% accuracy for kitchen faucet, 94% for washbasin faucet, 94% for bidet, 100% for the shower, and 100% for toilet flush, thus supporting the use of signal signatures of flow and pressure in identifying the hydraulic fixtures in use. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.