To see the other types of publications on this topic, follow the link: Process and virtual memory.

Journal articles on the topic 'Process and virtual memory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Process and virtual memory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhang, Heyu, Binglong Li, Wanpeng Li, Lin Zhu, Chaowen Chang, and Shilong Yu. "MRCIF: A Memory-Reverse-Based Code Injection Forensics Algorithm." Applied Sciences 13, no. 4 (2023): 2478. http://dx.doi.org/10.3390/app13042478.

Full text
Abstract:
The new DLL injection method and its variants can prevent the injected process from calling the common system API to load the injected DLL module so that the malicious module is invisible to the LDR linked list of the process. Traditional injection detection methods have low accuracy in forensic detection of new injection attacks. To solve this problem, this paper proposes a code injection covert memory page detection and forensic detection forensic algorithm based on a memory structure reverse analysis named MRCIF. First, the physical memory pages containing DLL features from the memory image are located, and a sub-algorithm is designed for mapping physical memory space and virtual memory space, thus realizing the reverse reconstruction of the physical page subset corresponding to the DLL code module. Then, in the virtual memory space, the LDR linked list structure of the process is reversely reconstructed, and a reverse reconstruction algorithm of the DLL virtual page subset is developed to reconstruct its virtual space. Finally, a DLL injection covert page detection sub-algorithm is designed based on the physical memory page subset and virtual space page subset. The experimental results indicate that MRCIF achieves an accuracy of 88.89%, which is much higher than that of the traditional DLL module injection detection method, and only MRCIF can accurately detect the Virtual Address Descriptor (VAD) remapping attack.
APA, Harvard, Vancouver, ISO, and other styles
2

Divya, YA. "An Efficient Virtual Memory using Graceful Code." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 623–26. https://doi.org/10.31142/ijtsrd23878.

Full text
Abstract:
Memory is hardware that is used by computer to load the operating system and run programs. It is buildup of RAM chip that has different memory modules. The amount of main memory in a computer is limited to the amount of RAM that has installed. Generally memory sizes are 256 MB, 512 MB, and 1 GB, because of computer has limited amount of RAM. When too many programs are simultaneously it is possible to run a program out of memory. This is the concept where virtual memory comes. Virtual memory enhance the available memory of a computer has by enlarging the address space or place in memory where data can be stored. Hard disk is used for additional memory allocation .However, since secondary storage is much slower than the RAM, program which is in Virtual Memory must be mapped back to virtual memory in order to be used. The process of mapping data and forth between the hard disc and RAM takes longer than accessing it directly from the memory. It means virtual memory is increased, the more it will slow your computer down. While virtual memory enables your computer to run more than one program it could, otherwise it is the best way to having as main memory as possible. Divya YA "An Efficient Virtual Memory using Graceful Code" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23878.pdf
APA, Harvard, Vancouver, ISO, and other styles
3

Torres, Gustavo, Karina Jaime, and Félix Ramos. "Brain Architecture for Visual Object Identification." International Journal of Cognitive Informatics and Natural Intelligence 7, no. 1 (2013): 75–97. http://dx.doi.org/10.4018/jcini.2013010104.

Full text
Abstract:
Visual memory identification is a key cognitive process for intelligent virtual agents living on virtual environments. This process allows the virtual agents to develop an internal representation of the environment for the posterior production of intelligent responses. There are many architectures based on memory modules for environment visual elements identification, as if they were invariant, this way of processing a visual scene is different from the one that real humans use. This document presents the description of a visual memory identification model based on current neuroscience state of art. Furthermore; the proposed model considers memory as a system that treats information in three stages: to encode, store and retrieve acquired knowledge about the environment. On the other hand, the authors validate the implementation of their approach with two identification tasks: when the stimulus is known and when it is unknown. Actually, this work is part of a proposal for a cognitive architecture that will let the authors create virtual agents with more credible human behaviors.
APA, Harvard, Vancouver, ISO, and other styles
4

Gaikwad, Gajanan Digambar. "Refresh Rate Identification Strategy for Optimal Page Replacement Algorithms for Virtual Memory Management." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 166–69. http://dx.doi.org/10.22214/ijraset.2021.38770.

Full text
Abstract:
Abstract: Operating system offers a service known as memory management which manages and guides primary memory. It moves processes between disk and main memory during the execution back and forth. The process in which we provisionally moves process from primary memory to the hard disk so the memory is available for other processes. This process is known as swapping. Page replacement techniques are the methods by which the operating system concludes which memory pages to be swapped out and write to disk, whenever a page of main memory is required to be allocated. There are different policies regarding how to select a page to be swapped out when a page fault occurs to create space for new page. These Policies are called page replacement algorithms. In this paper the strategy for identifying the refresh rate for ‘Aging’ page replacement algorithm is presented and evaluated. Keywords: Aging algorithm, page replacement algorithm, refresh rate, virtual memory management.
APA, Harvard, Vancouver, ISO, and other styles
5

Shrivastava, Rahul, Prabhat Kumar, and Sudhakar Tripathi. "A Human Memory Process Modeling." Recent Patents on Engineering 14, no. 2 (2020): 179–93. http://dx.doi.org/10.2174/1872212113666190211145444.

Full text
Abstract:
Background: The cognitive models based agents proposed in the existing patents are not able to create knowledge by themselves. They also did not have the inference mechanism to take decisions and perform planning in novel situations. Objective: This patent proposes a method to mimic the human memory process for decision making. Methods: The proposed model simulates the functionality of episodic, semantic and procedural memory along with their interaction system. The sensory information activates the activity nodes which is a binding of concept and the sensory values. These activated activity nodes are captured by the episodic memory in the form of an event node. Each activity node has some participation strength in each event depending upon its involvement among other events. Recalling of events and frequent usage of some coactive activity nodes constitute the semantic knowledge in the form of associations between the activity nodes. The model also learns the actions in context to the activity nodes by using reinforcement learning. The proposed model uses an energy-based inference mechanism for planning and decision making. Results: The proposed model is validated by deploying it in a virtual war game agent and analysing the results. The obtained results show that the proposed model is significantly associated with all the biological findings and theories related to memories. Conclusion: The implementation of this model allows humanoid and game agents to take decisions and perform planning in novel situations.
APA, Harvard, Vancouver, ISO, and other styles
6

Fang, Yi Qiu, Zhi Chao Song, and Jun Wei Ge. "Cloud Computing-Oriented Virtual Machine Live Migration Mechanism." Applied Mechanics and Materials 513-517 (February 2014): 1731–34. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1731.

Full text
Abstract:
In the process of memory pre-copy, aiming at the characteristic which the dirty pages may be re-transmitted, dirty pages based on the probability prediction pre-copy mechanism is proposed, which aims to reduce the data transmission and total migration time. The mechanism uses temporal locality principle, on the pages before transmission, probability prediction for memory page, give priority to transmission of dirty pages prediction probability low memory pages, avoiding high dirty pages resend. Simulation results show that: the mechanism can reduce the amount of data transmission, reducing downtime and total migration time.
APA, Harvard, Vancouver, ISO, and other styles
7

Adryana, Nadja, Niken Cahyani, and Erwid Jadied. "Static Code Analysis on The Effect of Virtual Secure Mode on Memory Acquisition with IDA." International Journal on Information and Communication Technology (IJoICT) 9, no. 1 (2023): 1–13. http://dx.doi.org/10.21108/ijoict.v9i1.688.

Full text
Abstract:
Memory acquisition process is one of digital forensics act. There are several tools that support memory acquisition process. At this time, there is a feature named secure mode that can caused crash or error in memory acquisition tools system and caused the tools to be unusable, also the loss of the computer memory. This research is focusing on analyzing the acquisition tools that has error or crash when the device that is being used for memory acquisition is in secure mode. The analysis is being carried out using static code analysis method, which is one of the techniques of reverse engineering, using IDA. This study aims to find the cause of the crash or error in memory acquisition tools. The purpose of this study is to be useful for digital forensic tester in understanding the potential risk of the secure mode impact in acquisition process. The results of this study indicate that different operating system and different kernel which runs in the device are the reasons that memory acquisition tools cannot run properly on VSM environment being turned on.
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar Bhatia, Arvind, and Gursharan Singh. "A Review on Different Types of Live VM Migration Methods with Proposed Pre-Copy Approach." International Journal of Engineering & Technology 7, no. 4.12 (2018): 6. http://dx.doi.org/10.14419/ijet.v7i4.12.20983.

Full text
Abstract:
Cloud computing is being considered as the future architecture of IT world. Virtualization creates logical resources from physical resources which are allocated with flexibility to applications. Server virtualization is a technique for the division of the physical machine into many Virtual Machines; every Virtual Machine has the capacity of applications execution similar to physical machine. The capability of Virtual Machine migration i.e. dynamic movement of Virtual Machines between physical machines is achieved by virtualization. Migration techniques differ w.r.t order of state transfer. Pre-copy migration method transfers all pages of memory from source to destination while Virtual Machine is executing on source. Post-copy migration is transfer of memory. content after the transfer of process state. Specially, post-copy migration, first copied the process states to the destination machine. Total time of migration, Total pages transferred and Downtime are important parameters considered during live Virtual Machine migration. Many improved live pre copy Virtual Machine migration techniques tries to decrease all the three above mentioned parameters. Proposed approach also tries to minimize all the three performance parameters.
APA, Harvard, Vancouver, ISO, and other styles
9

Golovashina, Oksana V. "Trial of Memory: Legal Regulation as a Tool of Memory Politics in Contemporary Russia." Changing Societies & Personalities 8, no. 2 (2024): 399. http://dx.doi.org/10.15826/csp.2024.8.2.280.

Full text
Abstract:
The article examines how law enforcement sanctions, typically applied to real-life actions, are being transferred to online activities. Building on François Hartog’s ideas, the study links memorial legislation to a new “regime of historicity,” highlighting its unique role in commemoration. By examining relevant laws and media discussions, the study follows the evolution of memorial legislation, demonstrating its importance in commemorating the Great Patriotic War in post-Soviet symbolic politics. Analysis of the amendments to Article 354.1 of Russia’s Criminal Code from its original formulation in 2014 to the revisions in 2021 reveals the shifting legal landscape surrounding online commemorative practices. As virtual spaces are gaining prominence in public discourse and legal interpretations, the boundaries between online activities and real-world actions are becoming increasingly blurred. The key trends in this process include the growing reliance on virtual platforms for information dissemination, the evolving notion of publicity in legal contexts pertaining to online behavior, and the broadening enforcement of Article 354.1. This research sheds light on the intricate interplay between memory politics, virtual spaces, and legal frameworks, reflecting broader societal shifts in information consumption and expression.
APA, Harvard, Vancouver, ISO, and other styles
10

Dentz, René. "Memory, Freedom, and Identity: Challenges to “Virtual Consciousness”." Revista Iberoamericana de Bioética, no. 25 (July 15, 2024): 01–13. http://dx.doi.org/10.14422/rib.i25.y2024.005.

Full text
Abstract:
This comprehensive text explores the intricate interplay of memory, virtuality, consciousness, and personhood in shaping the human experience. Memory is depicted as a core process integral to identity formation, transcending mere recollection to become a reflective exercise in self-discovery. The advent of the digital age raises concerns about the impact of virtual connections on authentic encounters and the preservation of individual autonomy amid algorithmic homogenizations. In examining consciousness and experience, the inseparability of life and consciousness is emphasized, alongside the significance of corporeality in self-awareness. Abduction is proposed as a mode of creative reasoning that expands our comprehension of the human mind and its relationship with the universe. Furthermore, the text delves into the notion of personhood, highlighting the complexity of identity formation through interaction with the world, others, and history. Through a reflective and pluralistic approach, traditional conceptions of being are challenged, inviting a deeper understanding of the multifaceted human condition.
APA, Harvard, Vancouver, ISO, and other styles
11

Prasad Arya, Govind, Devendra Prasad, and Sandeep Singh Rana. "An Improved Page Replacement Algorithm Using Block Retrieval of Pages." International Journal of Engineering & Technology 7, no. 4.5 (2018): 32. http://dx.doi.org/10.14419/ijet.v7i4.5.20004.

Full text
Abstract:
The computer programmer write programming codes of any length without keeping in mind the available primary memory. This is possible if we use the concept of virtual memory. As the name suggests, virtual memory is a concept of executing a programming code of any size even having a primary memory of smaller size than the size of program to be executed. The virtual memory can be implemented using the concept of paging. The operating system allocates a number of memory frames to each program while loading into the memory. The programming code is equally divided into pages of same size as frame size. The size of pages and memory frames are retained equal for the better utilization of the memory. During the execution of program, every process is allocated limited number of memory frames; hence there is a need of page replacements. To overcome this limitation, a number of page replacement techniques had suggested by the researchers. In this paper, we have proposed an modified page replacement technique, which is based on the concept of block reading of pages from the secondary storage. The disc access is very slow as compared to the access from primary memory. Whenever there is a page fault, the required page is retrived from the secondary storage. The numerous page faults increase the execution time of process. In the proposed methodology, a number of pages, which is equal to the allotted memory frames, are read every time when there is a page fault instead of reading a single page at a time. If a block of pages has fetched from secondary storage, it will definitely increases the possibilities of page hit and as a result, it will improve the hit ratio for the processes.
APA, Harvard, Vancouver, ISO, and other styles
12

Kedl, Ross, Tomasz Sosinowski, Jason White, Eric Cross, Pippa Marrack, and Laurent Gapin. "CD8+ DC trans-presentation of IL-15 to naïve CD8+ T cells produces antigen inexperienced T cells in the periphery with memory phenotype and function (P1315)." Journal of Immunology 190, no. 1_Supplement (2013): 119.15. http://dx.doi.org/10.4049/jimmunol.190.supp.119.15.

Full text
Abstract:
Abstract Various populations of memory phenotype CD8+ T cells have been described over the last 15-20 years, all of which possess elevated effector functions relative to naïve phenotype cells. Using a technique for isolating antigen specific cells from unprimed hosts, we recently identified a new subset of cells, specific for nominal antigen, but phenotypically and functionally similar to memory cells arising as a result of homeostatic proliferation (HP). We show here that these “Virtual Memory” cells are independent of previously identified “innate memory” cells, arising as a result of their response to IL-15 trans-presentation by lymphoid tissue-resident CD8α+ DCs in the periphery. The absence of IL-15, CD8+ T cell expression of either CD122 or Eomes, or of CD8a+ DCs all lead to the loss of Virtual Memory cells in the host. Our results show that CD8+ T cell homeostatic expansion is an active process within the non-lymphopenic environment, is mediated by IL-15, and produces antigen inexperienced memory cells which retain the capacity to respond to nominal antigen with memory-like function. Preferential engagement of these “Virtual Memory” T cells into a vaccine response could dramatically enhance the rate by which immune protection develops.
APA, Harvard, Vancouver, ISO, and other styles
13

Hatłas, Piotr, Janusz Juraszek, and Krzysztof Krupa. "Virtual Prototyping Process Supported by New Diagnostic Method -Method of Metal Magnetic Memory." Solid State Phenomena 164 (June 2010): 212–20. http://dx.doi.org/10.4028/www.scientific.net/ssp.164.212.

Full text
Abstract:
The aim of this work is to implement a new nondestructive testing (NDT) method based on the metal magnetic memory (MMM) effect into comprehensive diagnostic approach for power-line connectors, which is of great practical importance. Essence of this method lies in detection of stress concentration zones (SCZs) in material of the considered element during its operation (before micro-cracks and fracture occurs). If to compare with the traditional NDT methods, which indicate SCZs after the failure (post factum), this method provides major progress in the field of NDT. In this paper an approach of connection of numerical structural simulation (static and dynamic) with MMM-based testing method is also proposed. SCZs in power-line mechanical connector were evaluated and dynamic analysis of a complete power line, which included the analyzed connector, was carried out by means of MSC.ADAMS. Uniqueness of this analysis consist in integration of FEM analysis, MSC.ADAMS multibody system analysis (for testing of working conditions in advance - during virtual prototyping) and verification using MMM method. This hybrid approach enables to accomplish diagnostic analysis of selected construction elements and provides the possibility to take into consideration actual working conditions (e.g. vibrations) of the element. Proposed diagnostics method can substantially increase operational safety of electrical connectors and lines.
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Yuanyuan, Jing Chen, and Mingzhu Li. "Numerical Modeling of A New Virtual Trajectory Password Architecture." Journal of Physics: Conference Series 2068, no. 1 (2021): 012013. http://dx.doi.org/10.1088/1742-6596/2068/1/012013.

Full text
Abstract:
Abstract With the development of digital technology, Computer technology, communication technology and multimedia technology gradually infiltrate into each other and become the main core of information technology. In information technology, digital, text, graphics, images, sound, video, animation and other information carriers are spread through computers and the Internet. Due to the openness, sharing, dynamic and other characteristics of the Internet, information security is threatened and interfered. Information security has become a strategic issue that people must pay attention to, which is related to social stability, economic development and national security. This paper studies a new kind of virtual track cryptography, which breaks through the traditional character memory method and transforms it into memory graphics by using mathematical modeling, and changes the surface memory method from memorizing numbers and characters to memorizing trajectory graphics, so as to make the traditional process of people memorizing passwords easier.
APA, Harvard, Vancouver, ISO, and other styles
15

Hussain, Syed Ishtiaq, Huma Javed, Tehseen Khan, Sara Shazad, and Falak Naz Khalil. "Native Process Migration in Wireless Sensor Networks." International Journal of Distributed Sensor Networks 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/607143.

Full text
Abstract:
This paper presents a novel architecture for native process migration (PM) in wireless sensor networks (WSNs) without the use of virtual execution environment. Resources in WSN are scarce; therefore creating virtual execution environment puts extra burden on already stringent resources. In addition, the proposed architecture is migrating with complete process instead of code only which also saves resources. The proposed architecture makes process migration decisions by continuously monitoring resources, such as remaining battery life and free memory space on a node. The architecture is suitable for networks with fewer expensive sensor nodes as it allows for better utilization of network resources. Transferring a live executing process from one node to another to meet processing demands dynamically improves fault tolerance, resource utilization, and network management in WSN. The architecture has been successfully tested and implemented on both COOJA simulator and a test bed of TelosB motes.
APA, Harvard, Vancouver, ISO, and other styles
16

CHEN, LILI, YAN HONG, WEN YANG, CHUAN JIANG, and LIQIN LOU. "Research on experiment teaching of anthropometry and virtual clothing design based on Gagné information processing theory." Industria Textila 73, no. 05 (2022): 471–78. http://dx.doi.org/10.35530/it.073.05.202189.

Full text
Abstract:
With the promotion of education informatization in colleges and universities, virtual simulation technology is increasingly used in experimental teaching. In the teaching of fashion-related majors, virtual simulation technology can help students quickly and efficiently understand design theories, which are difficult for them to understand. However, due to the complexity of the virtual simulation experiment, it is difficult for students to master all the techniques required for the operation of the experimental system in a short time. In traditional teaching, students passively accept knowledge taught by the teacher and follow the teacher's operation, thereby affecting the learning effect. Such teaching and learning process cannot fully functionalize students' sensory system coding, and therefore cannot form long-term memory. To optimize the application of virtual simulation technology in the teaching of fashion-related majors, this paper proposes a clothing virtual simulation experimental teaching method based on Gagné information processing theory. To verify its effectiveness, anthropometry and virtual clothing design experiment was adopted as the research object. Two groups of students were involved in the experiments. One group was taught traditionally while another group was taught by the Gagné information processing mode. Through a set of learning and teaching process evaluation, experiment results demonstrated that Gagné information processing mode can effectively help students to fine-process the knowledge they have learned, so that important information can be extracted and encoded to form long-term memory. This paper provides support for future Gagné information processing theory in the teaching of virtual simulation courses and exercises.
APA, Harvard, Vancouver, ISO, and other styles
17

Rabia Mehmood. "Volatile Data Acquisition and Analysis by Using Memory Forensics Techniques." International Journal for Electronic Crime Investigation 7, no. 4 (2024): 81–90. http://dx.doi.org/10.54692/ijeci.2023.0704169.

Full text
Abstract:
Memory forensics is a vital component of digital investigations, involving the analysis of volatile memory (RAM) in computer systems to gather evidence, identify malicious activities, and reconstruct cybercrime incidents. This paper provides an overview of memory forensics, highlighting its defini-tion, importance, purpose, and scope. It explores the evolution and significance of memory forensics in response to increasingly complex cyber threats. The memory forensics process is discussed, cover-ing memory acquisition and analysis. Legal and ethical considerations related to the admissibility of memory evidence and privacy protection are examined. The paper also discusses the types of memory, including physical and virtual memory, and their characteristics and significance in memory forensics. Furthermore, it explores the memory acquisition process, different methods, tools, and techniques used, as well as the importance of preserving evidence integrity. Finally, the paper introduces various tools for memory analysis, such as Volatility, Volatility Workbench, FTK Imager, Encase, Hibernation Recon, and Xplico, and highlights their role in extracting valuable evidence from memory dumps.
APA, Harvard, Vancouver, ISO, and other styles
18

Jansen, Petra, Andrea Schmelter, and Martin Heil. "Spatial Knowledge Acquisition in Younger and Elderly Adults." Experimental Psychology 57, no. 1 (2010): 54–60. http://dx.doi.org/10.1027/1618-3169/a000007.

Full text
Abstract:
This study investigated the process of spatial knowledge acquisition in younger adults (20–30 years), middle-aged adults (40–50 years), and older adults (60–70 years) in a desktop virtual environment, where participants learned a way through a virtual maze, had to recall landmarks that were present in the maze, and had to draw an overview of the maze. The results revealed a general decline in spatial memory of the elderly, that is, in the time needed to learn a new route, in the retrieval of landmarks from memory (landmark knowledge), and in the ability to draw a map (configurational knowledge). When the route with landmarks was perfectly learned, however, there was no age dependent difference in finding the correct route without landmarks in the virtual maze (retrieval of route knowledge). Therefore, we conclude that not all aspects of spatial knowledge acquisition and spatial memory degrade with increasing age during adulthood.
APA, Harvard, Vancouver, ISO, and other styles
19

Kalyvioti, Katerina, and Tassos Mikropoulos. "A Virtual Reality Test for the Identification of Memory Strengths of Dyslexic Students in Higher Education." JUCS - Journal of Universal Computer Science 19, no. (18) (2013): 2698–721. https://doi.org/10.3217/jucs-019-18-2698.

Full text
Abstract:
Research suggests that Virtual Reality has a key role in the development of new diagnostic tools in neuropsychology and shows great rehabilitative potentials for individuals with specific neurological, intellectual and cognitive disabilities. In the case of dyslexia, a neurodevelopmental reading disorder, the use of Virtual Reality technologies has only been recently documented in a handful of studies. The main focus of these studies has been the identification of visuospatial strengths, the exploration of nonverbal problem solving treatment and the increase of awareness in educators and parents with children with dyslexia. Even fewer are the studies of Virtual Reality and the lifelong memory difficulties of adult individuals with dyslexia. With a more clinical, rather than technological, perspective the goal of this paper was to design specialized tasks in virtual environments to be part of a screening process/assessment of characteristic memory difficulties for undergraduate students diagnosed with dyslexia. Results showed that there were no statistically significant differences in the performance of students with dyslexia and students without dyslexia, a finding which highlights the development and successful use of compensatory memory strategies by the participants with dyslexia. Taking into consideration the real life representations, the multisensory approach, the increased sense of presence, the well-designed tasks and the recorded positive attitude of all participants, the study concludes that the use of Virtual Reality in neurological and neurodevelopmental memory disorders will be innovative and suggests that hands on Virtual Reality applications, become an indispensable part of these deficits' cognitive assessment and rehabilitation.
APA, Harvard, Vancouver, ISO, and other styles
20

Flint, Maureen A. "Cartographies of Memory and Affect: Nomadic Subjectivities." Art/Research International: A Transdisciplinary Journal 3, no. 2 (2018): 6–19. http://dx.doi.org/10.18432/ari29359.

Full text
Abstract:
This visual essay maps an event, the lines of affect produced through the interconnections between memory/time, space/place, and the virtual/actual. The assemblage begins in the middle of these interconnections: lines of text interwoven with intensity and affect. As posthuman theory urges researchers to consider subjectivity as unbounded and nomadic, a process of becoming with the world, this article takes up arts-based methods to map and inquire into the flows between death and becoming as a generative, embodied, and productive process. This article suggests the methodological possibilities for arts-based analysis and inquiry to engage the entangled materiality of the posthuman present.
APA, Harvard, Vancouver, ISO, and other styles
21

Lae, Wah Htun, Moh Myint Kay Moh, and Aye Cho Aye. "Analysis of Allocation Algorithms in Memory Management." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1985–87. https://doi.org/10.5281/zenodo.3591757.

Full text
Abstract:
Memory management is the process of controlling and coordinating computer memory, assigning portions called blocks to various running programs to optimize overall system performance and also known as memory allocation. Placement algorithms are implemented to determine the slot that can be allocated process amongst the available ones in the partitioned memory. Memory slots allocated to processes might be too big when using the existing placement algorithms hence losing a lot of space due to internal fragmentation. In dynamic partitioning, external fragmentation occurs when there is a sufficient amount of space in the memory to satisfy the memory request of a process but the process's memory request cannot be satisfied as the memory available is in a non contiguous manner. This paper describes how to resolve external fragmentation using three allocation algorithms. These algorithms are First fit, Best fit and Worst fit. We will present the implementation of three algorithms and compare their performance on generated virtual trace. Lae Wah Htun | Moh Moh Myint Kay | Aye Aye Cho "Analysis of Allocation Algorithms in Memory Management" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26731.pdf
APA, Harvard, Vancouver, ISO, and other styles
22

Santana, Wagner, and Priscilla Régis. "Memória social dos quilombos do Cariri um acervo virtual em construção." Páginas a&b Arquivos & Bibliotecas, no. 19 (2023): 280–92. http://dx.doi.org/10.21747/21836671/pag19ab1.

Full text
Abstract:
The lack of registration of the oral traditions of quilombola communities and the urgent need to strengthen the quilombos in a context of persecution and invisibility justify this research, which seeks to contribute to the production of knowledge as well asto collect memory and oral tradition of the Quilombo Serra dos Mulatos, in Jardim/CE. In a qualitative approach, we used bibliographical research and documental survey. In a later stage, field research will becarried out with the application of interviews and complementary methodologies. The objective is to capture and understand the memories that permeate the process of self-recognition and the potential impact of preserving the quilombola memory in the reality of the community. This is an important contribution to valuing the country's cultural diversity and to strengthening the remaining quilombo communities, ensuring that future generations have access to those oral traditions and the memory of their ancestors.
APA, Harvard, Vancouver, ISO, and other styles
23

Mazrekaj, Artan, Shkelzen Nuza, Mimoza Zatriqi, and Vlera Alimehaj. "An overview of virtual machine live migration techniques." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4433. http://dx.doi.org/10.11591/ijece.v9i5.pp4433-4440.

Full text
Abstract:
In a cloud computing the live migration of virtual machines shows a process of moving a running virtual machine from source physical machine to the destination, considering the CPU, memory, network, and storage states. Various performance metrics are tackled such as, downtime, total migration time, performance degradation, and amount of migrated data, which are affected when a virtual machine is migrated. This paper presents an overview and understanding of virtual machine live migration techniques, of the different works in literature that consider this issue, which might impact the work of professionals and researchers to further explore the challenges and provide optimal solutions.
APA, Harvard, Vancouver, ISO, and other styles
24

Artan, Mazrekaj, Nuza Shkelzen, Zatriqi Mimoza, and Alimehaj Vlera. "An overview of virtual machine live migration techniques." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4433–40. https://doi.org/10.11591/ijece.v9i5.pp4433-4440.

Full text
Abstract:
In a cloud computing the live migration of virtual machines shows a process of moving a running virtual machine from source physical machine to the destination, considering the CPU, memory, network, and storage states. Various performance metrics are tackled such as, downtime, total migration time, performance degradation, and amount of migrated data, which are affected when a virtual machine is migrated. This paper presents an overview and understanding of virtual machine live migration techniques, of the different works in literature that consider this issue, which might impact the work of professionals and researchers to further explore the challenges and provide optimal solutions.
APA, Harvard, Vancouver, ISO, and other styles
25

Ceuterick, Maud. "Queering cultural memory through technology." Alphaville: Journal of Film and Screen Media, no. 21 (August 5, 2021): 89–110. http://dx.doi.org/10.33178/alpha.21.05.

Full text
Abstract:
While cinema boasts of a long history that has placed the representation and aesthetics of memory at its centre, virtual reality (VR) and augmented reality (AR) are only starting to shape their own aesthetic and narrative engagement with memory. Through the analysis of Chez Moi (Caitlin Fisher and Tony Vieira, 2014), Queerskins: Ark (Illja Szilak, 2020), and Homestay (Paisley Smith, 2018), this essay shows how cinematic AR and VR involve the viewers’ movement to produce and transform collective memory and spatial habitation. Feminist digital geographies, film and media theory, and the concept of orientation developed by Sara Ahmed in Queer Phenomenology (2006) give sense to how sound, images and viewers’ movement participate to rewrite collective memory and cultural symbols. As these artworks present personal memories of struggles to find a home within present spaces, they queer hegemonic orientations of the subject, and invite viewers to re-align body and space within ever-changing virtual and digital spaces.
APA, Harvard, Vancouver, ISO, and other styles
26

Aalaa, Galal A. Elbelgehy, AbdElrazek Samir, M. El-Bakry Hazem, and M. Riad A. "Performance evaluation of virtual cloud labs using hypervisor and container." Indian Journal of Science and Technology 13, no. 48 (2020): 4646–53. https://doi.org/10.17485/IJST/v13i48.2085.

Full text
Abstract:
Abstract <strong>Objectives:&nbsp;</strong>To measure the performance of docker swarm technology in virtual labs.&nbsp;&nbsp;<strong>Methods :</strong>&nbsp;The virtual laboratory is developed as a group of four system machines (VMs) on the same host computer as a cluster. The simulation depends on Linux OS, VirtualBox, Docker Swarm, Nginx, and Redis tools. Visualizing the tracing process by using portainer.&nbsp;<strong>Findings:</strong>&nbsp;The performance analysis of building virtual labs and running six main educational services using docker swarm virtualization technology are explained in detail. The experimental results have shown that the maximum utilization of the central processing unit (CPU) has reached 13% only for the nodes, 11% for the services, and 1% for the container, which considered very efficient in terms of processing. Moreover, the results have proved the effectiveness of the docker swarm in terms of memory usage since the maximum memory usage of nodes reached 101 MB, 103 MB for Container, and only 2% for each service. Additionally, the maximum network transition has reached (941 Bps) for service.&nbsp;<strong>Novelty/Applications:</strong>&nbsp;Building Cloud Virtual Labs enable students to connect remotely to the virtual machine at anytime and anywhere. Also, these labs enable instructors to trace the students&rsquo; progress and manage the evaluation process. <strong>Keywords:</strong> Container; cloud; docker; hypervisor; orchestration; swarm
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, Wen Jin, Tai Yong Wang, Sheng Bo Fan, and Zhi Qiang Zhang. "Research on Virtual Material Removal Model in CNC Machining Simulation Based on Adaptive Dynamic Tri-Prism Algorithm." Key Engineering Materials 431-432 (March 2010): 178–81. http://dx.doi.org/10.4028/www.scientific.net/kem.431-432.178.

Full text
Abstract:
In this paper, based on the octree partition, bounding boxes and triangulated surface model, we developed a new virtual material removal method for machining of 3D complex surfaces. In this method a new tri-prism space partition algorithm based on octree and triangulated surface model is applied to partition the 3D complex surfaces. Traditional triangular-faced algorithm is used in 3-axis machining simulation, which is computationally expensive and memory demanding. In contrast, this paper presents a virtual material removal model using the dynamic tri-prism space decomposition algorithm (i) to represent 3D complex objects, (ii) to reduce the computation complexity, and (iii) to accelerate the model updating procedures in a graphic simulation process. Based on mathematical model of virtual material removal, the 3D model of virtual CNC machining process was developed.
APA, Harvard, Vancouver, ISO, and other styles
28

Sun, Zhi Hong, and Xian Lang Hu. "Live Migration for Virtual Machine Based on Kalman Prediction of Dirty Pages." Applied Mechanics and Materials 668-669 (October 2014): 1363–67. http://dx.doi.org/10.4028/www.scientific.net/amm.668-669.1363.

Full text
Abstract:
The live migration of virtual machine (VM) is an important technology of cloud computing. Down-time, total migration time and network traffic data are the key measures of performance. Through the analysis of dynamic memory state of a virtual machine migration process, we propose a dirty pages algorithm prediction based on pre-copy to avoid dirty pages re transmission. Experimental results show that, compared with the Xen virtual machine live migration method adopted, our method can at least reduce 15.1% of the total amount of data and 12.2% of the total migration time.
APA, Harvard, Vancouver, ISO, and other styles
29

Marquez, Jack, Oscar H. Mondragon, and Juan D. Gonzalez. "An Intelligent Approach to Resource Allocation on Heterogeneous Cloud Infrastructures." Applied Sciences 11, no. 21 (2021): 9940. http://dx.doi.org/10.3390/app11219940.

Full text
Abstract:
Cloud computing systems are rapidly evolving toward multicloud architectures supported on heterogeneous hardware. Cloud service providers are widely offering different types of storage infrastructures and multi-NUMA architecture servers. Existing cloud resource allocation solutions do not comprehensively consider this heterogeneous infrastructure. In this study, we present a novel approach comprised of a hierarchical framework based on genetic programming to solve problems related to data placement and virtual machine allocation for analytics applications running on heterogeneous hardware with a variety of storage types and nonuniform memory access. Our approach optimizes data placement using the Hadoop File System on heterogeneous storage devices on multicloud systems. It guarantees the efficient allocation of virtual machines on physical machines with multiple NUMA (nonuniform memory access) domains by minimizing contention between workloads. We prove that our solutions for data placement and virtual machine allocation outperform other state-of-the-art approaches.
APA, Harvard, Vancouver, ISO, and other styles
30

Urdaibay, Rocio Luna, Claudia Fragoso Susunaga, and Adriana Rovira Vázquez. "FRACTALES. Obra artística virtual transdisciplinaria." e-Letras com Vida: Revista de Estudos Globais — Humanidades, Ciências e Artes 07 (2021): 64–79. http://dx.doi.org/10.53943/elcv.0221_05.

Full text
Abstract:
FRACTALES is an artistic hypertext in constant development. It begins in 2020, based on an international collaboration between stage and digital media creators (Mexico-USA) interested in exploring their «womanhood». The project, of hybrid origin, is being configured from 10 major ideas: generate a horizontal process, cross disciplines transversally, as well as the competences of creation and research, favor a childlike aesthetic, summon play, work with memory and imagination, assuming unpredictability, allowing appropriation, venturing into the realm of intimacy and the feminine. During their creative process, the artists-researchers involved approach the study of transdisciplinarity, which allows them to theoretically systematize several of the precepts that support the proposal, in such a way that their theoretical-practical, artistic-investigative, private-public merges into a first product: FRACTALES - FIRST TERRITORY/PRIMER TERRITORIO. Once the first stage of the work is built, it is presented to groups of students, Art History students, researchers, national and international creators to be intervened. There are no fixed routes, it is not known how the FIRST TERRITORY/PRIMER TERRITORIO will be deconstructed, there is no censorship or guidelines for the loading or unloading of the materials generated on the slates that accumulate. In the year 2021, FRACTALES already constitutes a rhizome in constant expansion, open to your sight and periodic intervention, where open relationships of an affective-sensory-intellectual-sensitive-esthetic-public-social-personal order are established... In this article, the creative process experienced by the creators is systematized, contemplating expressive needs, poetic stakes and theoretical foundations through an analytical descriptive process.
APA, Harvard, Vancouver, ISO, and other styles
31

Maulina, Sinta Nur, Niken Dwi Wahyu Cahyani, and Erwid Musthofa Jadied. "ANALYSIS OF THE EFFECT OF VSM ON THE MEMORY ACQUISITION PROCESS USING THE DYNAMIC ANALYSIS METHOD." JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 8, no. 2 (2023): 638–46. http://dx.doi.org/10.29100/jipi.v8i2.3745.

Full text
Abstract:
At first, forensics was restricted to studying data that was stored on a system's hard disk. However, as storage capacity and data encryption increased, applying conventional digital forensic procedures became more challenging. As a result, memory forensics techniques are developed, or are frequently referred to as live forensics, because the process is quicker and more sophisticated. Volatile memory forensics, often known as live forensics, are necessary for this condition. Live forensics has flaws, specifically that some programs can fail when the computer is in active VSM (virtual secure mode). This results in the retrievable evidence being lost. Therefore, determining the cause is essential. The software-based memory acquisition tools Autopsy, Isobuster, DumpIt, and Magnet RAM Capturer are just a few examples. According to the findings of the experiments, the tools that have crashed include DumpIt v1.3.2.20110401. A dynamic code analysis using WindBg as a tool was utilized to study the impact of VSM on the memory acquisition tool. This study's goal is to identify the instances of crashes in various forensic instruments, which will be highly useful for forensic experts performing investigations.
APA, Harvard, Vancouver, ISO, and other styles
32

Brody, Nicholas, Leah LeFebvre, and Kate Blackburn. "Holding on and letting go: Memory, nostalgia, and effects of virtual possession management practices on post-breakup adjustment." Journal of Social and Personal Relationships 37, no. 7 (2020): 2229–49. http://dx.doi.org/10.1177/0265407520921460.

Full text
Abstract:
When people end their relationships, they must choose which parts of the relationship to remember and forget as they prepare themselves for future partners. This memory process is complicated by the recordability and permanence of mediated messages because individuals must actively curate their virtual possessions—such as pictures with a previous partner or online relationship statuses. Using the relational dissolution model framework, this study investigated the behaviors people use online to manage the end of their relationships and how these choices may influence the way they adjust to the breakup. College students ( N = 234) were surveyed to examine how their keeping and deleting of virtual possessions are related to their post-breakup adjustment. Results suggest that keeping virtual possessions negatively relates to post-breakup adjustment. Participants who were more nostalgic were more likely to keep virtual possessions following a breakup, which mediated the relationship between nostalgia and post-breakup adjustment. The implications show how the persistence of mediated possessions has the potential to affect the breakup process as people struggle to manage their relational memories.
APA, Harvard, Vancouver, ISO, and other styles
33

Syarifuddin, Syarifuddin. "Virtual Museum : A Learning Material Of Indonesia National History." International Journal of Multicultural and Multireligious Understanding 4, no. 6 (2017): 51. http://dx.doi.org/10.18415/ijmmu.v4i6.96.

Full text
Abstract:
The technology role of educational level nowadays rapidly grows, simultaneously it facilitates a learning process, especially in learning history. The students mind set is still on short term memory that affect the learning process are getting conservative and monotonous as well as do not have an experience. Virtual museum is one of the learning material forms referring to the indirect experience, based on Edgar Dale. The study applies qualitative research technique, the data uses in-depth interview to three group respondents consist of two History Education Department lectures of Sriwijaya University, 15 History Education Department students and three stakeholders. Based on the research findings, they are gotten by using virtual museum, the students are able to get the indirect experience on learning process focused in Indonesia National History. Therefore, it is expected able to become one of virtual museum development materials.
APA, Harvard, Vancouver, ISO, and other styles
34

Vargas Valencia, Javier. "Analysis of the efficiency of a virtualoptical multiplexing method, by using theta modulation." TecnoLógicas 20, no. 39 (2017): 173–84. http://dx.doi.org/10.22430/22565337.699.

Full text
Abstract:
We present an efficient virtual-optical multiplexing method for compressing information contained in gray level images. The efficiency is measured using three parameters: quality factors of recovered images, memory saving percentage achieved, and number of multiplexed images in the package. Theta modulation techniques are applied, to process an N number of gray level images, by using a virtual-optical 2f architecture, from which we obtain a complex package M, to be stored as two images, amplitude and phase, in commercial formats. We apply pixel optimization and Fourier plane filtering to amplitude and phase images, respectively, storing only a percentage of the Fourier plane with a pixel dynamic range optimization. The stored package spends much less memory than individual images. The recovered images after the demultiplexing process are compared with the original ones by using correlation coefficient, obtaining high quality factors for decompressed images. We perform simulations, showing the efficiency of the proposed process, and our results are compared to the same factors reported in recent publications, making our improvements evident.
APA, Harvard, Vancouver, ISO, and other styles
35

Tank, Darshan, Miral Patel J, Hasmukh Koringa P, Divyesh Keraliya, Jaydeep Tadhani R, and Sunil Soni J. "Utilizing Virtual Machine Introspection and Memory Forensics to Identify Different Forms of Process Injection in a Virtualized Environment." International Research Journal of Multidisciplinary Scope 06, no. 02 (2025): 896–918. https://doi.org/10.47857/irjms.2025.v06i02.03576.

Full text
Abstract:
Sophisticated malware frequently employs advanced evasion techniques to remain undetected by traditional security mechanisms. One of the most commonly used tactics is process injection, where malicious code is covertly inserted into the address space of legitimate processes. This allows the malware to operate under the guise of trusted applications, making detection significantly more challenging. In response to this issue, the present study introduces a novel detection methodology that functions entirely outside the virtual machine (out-of-VM). This technique leverages advanced memory introspection to identify and analyze different forms of process injection within virtualized environments. Notably, the approach is agentless, meaning it does not require any software to be installed within the guest VM, thereby eliminating the risk of the detection system itself being compromised or bypassed by the malware. Instead, it analyzes memory from the hypervisor level, providing a more secure and isolated vantage point. Experimental evaluations validate the effectiveness of the proposed method, demonstrating superior performance when compared to existing detection frameworks. Specifically, the method achieves higher detection accuracy, with more true positives and fewer false positives. It is capable of precisely identifying injected memory regions and detecting a broader spectrum of malware types, thereby outperforming current state-of-the-art solutions across all major evaluation metrics.
APA, Harvard, Vancouver, ISO, and other styles
36

Vijaya, C., and P. Srinivasan. "A Hybrid Technique for Server Consolidation in Cloud Computing Environment." Cybernetics and Information Technologies 20, no. 1 (2020): 36–52. http://dx.doi.org/10.2478/cait-2020-0003.

Full text
Abstract:
AbstractThe goal of data centers in the cloud computing environment is to provision the workloads and the computing resources as demanded by the users without the intervention of the providers. To achieve this, virtualization based server consolidation acts as a vital part in virtual machine placement process. Consolidating the Virtual Machines (VMs) on the Physical Machines (PMs) cuts down the unused physical servers, decreasing the energy consumption, while keeping the constraints for CPU and memory utilization. This technique also reduces the resource wastage and optimizes the available resources efficiently. Ant Colony Optimization (ACO) that is a well-known multi objective heuristic algorithm and Grey Wolf Algorithm (GWO) has been used to consolidate the servers used in the virtual machine placement problem. The proposed Fuzzy HAGA algorithm outperforms the other algorithms MMAS, ACS, FFD and Fuzzy ACS compared against it as the number of processors and memory utilization are lesser than these algorithms.
APA, Harvard, Vancouver, ISO, and other styles
37

Ortiz, Bengie L., Vibhuti Gupta, Jo Woon Chong, Kwanghee Jung, and Tim Dallas. "User Authentication Recognition Process Using Long Short-Term Memory Model." Multimodal Technologies and Interaction 6, no. 12 (2022): 107. http://dx.doi.org/10.3390/mti6120107.

Full text
Abstract:
User authentication (UA) is the process by which biometric techniques are used by a person to gain access to a physical or virtual site. UA has been implemented in various applications such as financial transactions, data privacy, and access control. Various techniques, such as facial and fingerprint recognition, have been proposed for healthcare monitoring to address biometric recognition problems. Photoplethysmography (PPG) technology is an optical sensing technique which collects volumetric blood change data from the subject’s skin near the fingertips, earlobes, or forehead. PPG signals can be readily acquired from devices such as smartphones, smartwatches, or web cameras. Classical machine learning techniques, such as decision trees, support vector machine (SVM), and k-nearest neighbor (kNN), have been proposed for PPG identification. We developed a UA classification method for smart devices using long short-term memory (LSTM). Specifically, our UA classifier algorithm uses raw signals so as not to lose the specific characteristics of the PPG signal coming from each user’s specific behavior. In the UA context, false positive and false negative rates are crucial. We recruited thirty healthy subjects and used a smartphone to take PPG data. Experimental results show that our Bi-LSTM-based UA algorithm based on the feature-based machine learning and raw data-based deep learning approaches provides 95.0% and 96.7% accuracy, respectively.
APA, Harvard, Vancouver, ISO, and other styles
38

Zhang, Long, Zecheng Li, and Jahng Surng Gahb. "Research and analysis of interaction in virtual reality films in the context of new media." SHS Web of Conferences 167 (2023): 01020. http://dx.doi.org/10.1051/shsconf/202316701020.

Full text
Abstract:
With the continuous progress of computer network technology and the burst of new digital media art, virtual reality technology, a revolution in transmitting information, has come into being. As a brand new combination of computer technology and film art, virtual reality films have an interactive experience that no other art genre can achieve. During the movie watching process, the audience can walk into the movie scene, panoramic arbitrary observation of any angle around, and active interaction with people or objects in the scene, creating a personal memory palace, creating a unique storyline, creating a virtual dream space, and re-creating personal life and personal experience in the process of virtual experience. This paper firstly, through understanding the origin and background of virtual reality, analyzing and comparing the development status of virtual reality movies at home and abroad and looking forward to its prospect, so as to arrive at the possible value of virtual reality movies realized under the future digital technology media; secondly, combining the characteristics of virtual reality interactive technology, through analyzing the development process of traditional movie experience, comparing and arriving at the difference between traditional movies and virtual reality movies in Secondly, by analyzing the development process of traditional movie experience with the characteristics of virtual reality interactive technology, we compare and contrast the experience difference between traditional movies and virtual reality movies in four aspects: time and space construction, screen boundary, subjective experience, and interaction mode; secondly, we analyze the experience process from shallow to deep in virtual reality movies, and explore the psychological demand value rooted in the spirit after the intermingling of technology and movie content; finally, we elaborate on the experience value feedback brought to the audience after the practical application of virtual reality technology, and at the same time, we think deeply about this new digital technology medium. Lastly, it is the feedback of the experience value brought by the practical application of virtual reality technology to the audience and the reflection and critique of this new digital technology medium.
APA, Harvard, Vancouver, ISO, and other styles
39

Yang, Jianhua, and Chen Jiang. "Intersubjectivity and Virtual Practice in Courses Teaching." International Journal of Emerging Technologies in Learning (iJET) 17, no. 10 (2022): 4–15. http://dx.doi.org/10.3991/ijet.v17i10.30915.

Full text
Abstract:
Based on the intersubjectivity during the teaching of teachers and the learning of students, this study explores the application of intersubjectivity and virtual practice teaching in courses teaching. By studying the current situation of intersubjectivity, virtual practice teaching, and teaching in courses teaching in China, this study designs the immersive virtual practice teaching stage from the perspective of practice according to the connotation of intersubjectivity and its application in courses teaching in colleges and universities. In the stage of immersive virtual practice teaching, by determining the beneficiaries of the course, designing the teaching objects, analyzing the teaching pain points, and designing and optimizing the teaching thinking, the HMM-FNN gesture recognition model was used to identify the gestures operated by the teachers and students in the process of immersive virtual practice teaching. The model further analyzed the advantages of virtual reality technology during the process of courses teaching in view of gesture recognition in the process of courses teaching. Empirical results show that this method can effectively prolong the students’ memory of courses teaching and greatly improve the interactive range of teaching resources. The lowest loss value of gesture recognition between the teachers and students is only 0.4, and virtual practice teaching has strong application. After application, the number of students who fail to pass the examinations dropped significantly, which can effectively improve the scores of students.
APA, Harvard, Vancouver, ISO, and other styles
40

Lavina, Mall* Nihal Shaikh. "CANTEEN MANAGEMENT SYSTEM USING RFID TECHNOLOGY BASED ON CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 4 (2017): 173–77. https://doi.org/10.5281/zenodo.557142.

Full text
Abstract:
We are currently in the midst of a technological and computing revolution that will drastically change our lives and potentially redefine what it means to be human. Automation in many fields has replaced the old school pen and paper and at the same time proved to be more efficient, correct and less cumbersome making our life much easier. This automation process when applied on an integral part of the working people i.e. “canteen” helps reduce the service time, eliminates queues, there is no burden to provide the exact change to the staff for the order; to name a few benefits on the canteen’s customer side and on the other hand it provides a reliable way of storing records and keeping the money safe as mostly the payments are made online via virtual money; benefits for the canteen owner. We achieve this automation process by using Radio Frequency Identification (RFID) card, an RFID card reader, a tablet and hosting the application on cloud.
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Lian Hai, and Qiu Liang Xu. "Integrity and Fidelity Evaluation of Digital Evidence in Live Forensics." Applied Mechanics and Materials 571-572 (June 2014): 90–99. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.90.

Full text
Abstract:
The integrity and fidelity of digital evidence are very important in live forensics. Previous research has studied the uncertainty of live forensics based on different memory snapshots. However, this kind of method is not effective in practice. In fact, memory images are usually acquired by using forensics tools instead of using snapshots. Therefore, the integrity and fidelity of live evidence should be evaluated during the acquisition process. In this paper, we give a new viewpoint that memory acquisition can be regarded as a measurement of memory data. From this viewpoint, we evaluate the integrity and fidelity of live evidence in the process of physical memory acquisition. Firstly, several definitions about memory acquisition measure error are introduced to describe the trusty. Then, we analyze the experimental error and propose some suggestions on how to reduce it. A novel method is also developed to calculate the system error in detail. The results of a case study on Windows 7 and VMware virtual machine show that the experimental error has good accuracy and precision, which demonstrate the efficacy of the proposed reducing methods. The system error is also evaluated, that is, it accounts for the whole error from 30% to 50%. Last, a method is proposed to calculate changes or error of system process.
APA, Harvard, Vancouver, ISO, and other styles
42

Fan, Wenhan, Zhicheng Ding, Ruixin Huang, Chang Zhou, and Xuyang Zhang. "Improved AdaBoost for virtual reality experience prediction based on Long Short-Term Memory network." Applied and Computational Engineering 77, no. 1 (2024): 158–63. http://dx.doi.org/10.54254/2755-2721/77/20240678.

Full text
Abstract:
A classification prediction algorithm based on Long Short-Term Memory Network (LSTM) improved AdaBoost is used to predict virtual reality (VR) user experience. The dataset is randomly divided into training and test sets in the ratio of 7:3.During the training process, the model's loss value decreases from 0.65 to 0.31, which shows that the model gradually reduces the discrepancy between the prediction results and the actual labels, and improves the accuracy and generalisation ability. The final loss value of 0.31 indicates that the model fits the training data well, and is able to make predictions and classifications more accurately. The confusion matrix for the training set shows a total of 177 correct predictions and 52 incorrect predictions, with an accuracy of 77%, precision of 88%, recall of 77% and f1 score of 82%. The confusion matrix for the test set shows a total of 167 correct and 53 incorrect predictions with 75% accuracy, 87% precision, 57% recall and 69% f1 score. In summary, the classification prediction algorithm based on LSTM with improved AdaBoost shows good prediction ability for virtual reality user experience. This study is of great significance to enhance the application of virtual reality technology in user experience. By combining LSTM and AdaBoost algorithms, significant progress has been made in user experience prediction, which not only improves the accuracy and generalisation ability of the model, but also provides useful insights for related research in the field of virtual reality. This approach can help developers better understand user requirements, optimise virtual reality product design, and enhance user satisfaction, promoting the wide application of virtual reality technology in various fields.
APA, Harvard, Vancouver, ISO, and other styles
43

Elvir, Miguel, Avelino J. Gonzalez, Christopher Walls, and Bryan Wilder. "Remembering a Conversation – A Conversational Memory Architecture for Embodied Conversational Agents." Journal of Intelligent Systems 26, no. 1 (2017): 1–21. http://dx.doi.org/10.1515/jisys-2015-0094.

Full text
Abstract:
AbstractThis paper addresses the role of conversational memory in Embodied Conversational Agents (ECAs). It describes an investigation into developing such a memory architecture and integrating it into an ECA. ECAs are virtual agents whose purpose is to engage in conversations with human users, typically through natural language speech. While several works in the literature seek to produce viable ECA dialog architectures, only a few authors have addressed the episodic memory architectures in conversational agents and their role in enhancing their intelligence. In this work, we propose, implement, and test a unified episodic memory architecture for ECAs. We describe a process that determines the prevalent contexts in the conversations obtained from the interactions. The process presented demonstrates the use of multiple techniques to extract and store relevant snippets from long conversations, most of whose contents are unremarkable and need not be remembered. The mechanisms used to store, retrieve, and recall episodes from previous conversations are presented and discussed. Finally, we test our episodic memory architecture to assess its effectiveness. The results indicate moderate success in some aspects of the memory-enhanced ECAs, as well as some work still to be done in other aspects.
APA, Harvard, Vancouver, ISO, and other styles
44

Mania, Katerina, Andrew Robinson, and Karen R. Brandt. "The Effect of Memory Schemas on Object Recognition in Virtual Environments." Presence: Teleoperators and Virtual Environments 14, no. 5 (2005): 606–15. http://dx.doi.org/10.1162/105474605774918769.

Full text
Abstract:
Prior theoretical work on memory schemas, an influential concept of memory from the field of cognitive psychology, is presented for application to fidelity of computer graphics simulations. The basic assumption is that an individual's prior experience will influence how he or she perceives, comprehends, and remembers new information in a scene. Schemas are knowledge structures; a scene could incorporate objects that fit into a specific context or schema (e.g., an academic's office) referred to as consistent objects. A scene could also include objects that are not related to the schema in place referred to as inconsistent objects. In this paper, we describe ongoing development of a rendering framework related to scene perception based on schemas. An experiment was carried out to explore the effect of object type and rendering quality on object memory recognition in a room. The computer graphics simulation was displayed on a Head Mounted Display (HMD) utilizing stereo imagery and head tracking. Thirty-six participants across three conditions of varied rendering quality of the same space were exposed to the computer graphics environment and completed a memory recognition task. Results revealed that schema consistent elements of the scene were more likely to be recognized than inconsistent information. Overall higher confidence ratings were assigned for consistent objects compared to inconsistent ones. Total object recognition was better for the mid-quality condition compared to the low-quality one. The presence of shadow information, though, did not affect recognition of either consistent or inconsistent objects. Further explorations of the effect of schemas on spatial awareness in synthetic worlds could lead to identifying areas of a computer graphics scene that require better quality of rendering as well as areas for which lower fidelity could be sufficient. The ultimate goal of this work is to simulate a perceptual process rather than to simulate physics.
APA, Harvard, Vancouver, ISO, and other styles
45

Aryamov, Andrej. "Legal status of thinking in virtual space." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2020, no. 2 (2020): 96–101. http://dx.doi.org/10.35750/2071-8284-2020-2-96-101.

Full text
Abstract:
In this article, the authors based on the basic provisions of cognitive psychology and the General theory of risky decision-making (risk management section) investigated the specifics of the influence of the modern digital environment on the psychology of thinking of a person acting in a risky situation. The main parameters of the impact of digital technology on perception of information, its selection, memory, goal setting will and emotions of the human mind (not only personal but also collective); and also the limits of the impact of digital technology on decision-making person. The author studies the specifics of the influence of personal factors on the process of generating a strong-willed decision, the risks associated with this circumstance, and the potential of digital resources tools in terms of minimizing negative consequences and hedging such risks.
APA, Harvard, Vancouver, ISO, and other styles
46

Xu, Wulong, Xijie Sun, and Shihui Pan. "Visual Dissemination of Intangible Cultural Heritage Information Based on 3D Scanning and Virtual Reality Technology." Scanning 2022 (September 25, 2022): 1–7. http://dx.doi.org/10.1155/2022/8762504.

Full text
Abstract:
In order to meet the needs of modern people for the acquisition of intangible cultural heritage information, the authors propose a research method that combines 3D scanning and virtual reality technology. Taking the production process of Xiuyu as an example, using Unity3D virtual reality technology combined with a digital platform, 3D modeling of Xiuyu is carried out, so that people can view the intangible cultural heritage information intuitively. The experimental results show that after using this method, more than 60% of more than 1000 people surveyed in the questionnaire want to experience intangible cultural heritage. In a survey of visualization platforms conducted at the same time, 90% of users are willing to combine jade carving technology with 3D scanning virtual reality technology. Conclusion. 3D scanning and virtual reality technology can further promote the process of inheritance and dissemination of intangible cultural heritage, accelerate the cultivation of intangible cultural heritage talents through the visualization platform, and promote the sustainable development of intangible cultural heritage, in order to better pass down the life memory and cultural genes of our ancient nation.
APA, Harvard, Vancouver, ISO, and other styles
47

Min, Woongki. "A Preliminary Discussion on the Tourism Resource Development of Local Oral Content - Focusing on the Possibility of Applying the Convergent Concepts of Cultural Memory, Oral Culture, and Storytelling." Global Knowledge and Convergence Association 7, no. 2 (2024): 253–84. https://doi.org/10.47636/gkca.2024.7.2.253.

Full text
Abstract:
This study organized the concepts of cultural memory, oral culture, and storytelling for tourism resource development of local oral content, and discussed how these concepts can be integrated and applied to the tourism development process of local communities at a preliminary level. The prototype of local oral content can be a combination of various factual and virtual implementations of cultural memory members of a local community share. Local oral content transmits and preserves collective knowledge through cultural memory, helping establish the cultural identity of humans. Oral content based on a specific local culture has the characteristic of a convergent cultural content that combines academic concepts such as literature, history, art, and philosophy. The storytelling plays a role in mediating various humanistic concepts in the process of developing local oral content into tourism resources. The storytelling process helps various social products with orality to be interpreted by human memory, given special cultural meanings, and established as a unique oral culture of the region. As part of the preliminary study for tourism resource development of local oral content, the study on the concepts of implementing a convergence knowledge ecosystem related to cultural memory, oral culture, and storytelling is significant as an academic study based on the humanities.
APA, Harvard, Vancouver, ISO, and other styles
48

Frasheri, Neki, and Emanouil Atanassov. "Scalability Issues for Wind Simulation Using OpenFOAM." Cybernetics and Information Technologies 17, no. 5 (2017): 27–36. http://dx.doi.org/10.1515/cait-2017-0052.

Full text
Abstract:
Abstract The use of the OpenFOAM software for wind simulation over rugged terrain is studied in the paper. OpenFOAM requirements for runtime, virtual memory and disk space are considered using small and medium resolution Digital Elevation Models (DEM) models for single-process and multi-process cases when running on local workstation and small parallel systems. Based on obtained data, extrapolation of requirements for relatively high resolution models are made and issues concerning the scalability are discussed.
APA, Harvard, Vancouver, ISO, and other styles
49

Gratch, Lyndsay Michalik. "The Irish Hills of Michigan." Departures in Critical Qualitative Research 7, no. 1 (2018): 68–100. http://dx.doi.org/10.1525/dcqr.2018.7.1.68.

Full text
Abstract:
Grounded in the Irish Hills of Michigan, this essay offers performative curation as a method to address the complexities of virtual tourist experiences, in terms of postindustrial, rural, roadside tourism and nostalgic memory. Performative curation juxtaposes tourist accounts, “official” histories, autoethnography, tall tales, dramatic scripts, descriptions of physical artifacts, images, and other texts. As a hybrid of performative writing, collage, and digital content curation, the method is reflexive about the mediation involved in visiting, representing, and remembering tourist locations, and asks the reader to take an explicitly active and ethical role in the virtual tour and meaning-making process.
APA, Harvard, Vancouver, ISO, and other styles
50

Haenel, R., Q. Semler, E. Semin, P. Grussenmeyer, and E. Alby. "INTEGRATION OF DEPTH MAPS FROM ARCORE TO PROCESS POINT CLOUDS IN REAL TIME ON A SMARTPHONE." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIII-B2-2022 (May 30, 2022): 201–8. http://dx.doi.org/10.5194/isprs-archives-xliii-b2-2022-201-2022.

Full text
Abstract:
Abstract. Real-world three-dimensional reconstruction is a project of long-standing interest in global computer vision. Many tools have emerged these past years to accurately perceive the surrounding world either through active sensors or through passive algorithmic methods. With the advent and popularization of augmented reality on smartphones, new visualization issues have emerged concerning the virtual experience. Especially a 3D model seems to be essential to provide more realistic AR effects including consistency of occlusion, shadow mapping or even collision between virtual objects and real environment. However, due to the huge computation of most of current approaches, most of these algorithms are working on a computer desktop or high-end smartphones. Indeed, the reconstruction scale is rapidly limited by the complexity of both computation and memory. Therefore, our study aims to find a relevant method to process real time reconstruction of close-range outdoor scenes such as cultural heritage or underground infrastructures in real time locally on a smartphone.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!