To see the other types of publications on this topic, follow the link: Situated computing.

Journal articles on the topic 'Situated computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Situated computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Svahn, Fredrik, and Ola Henfridsson. "Situated Knowledge in Context-Aware Computing." International Journal of Advanced Pervasive and Ubiquitous Computing 1, no. 3 (July 2009): 23–41. http://dx.doi.org/10.4018/japuc.2009090802.

Full text
Abstract:
A central feature of ubiquitous computing applications is their capability to automatically react on context changes so as to support users in their mobility. Such context awareness relies on models of specific use contexts, embedded in ubiquitous computing environments. However, since most such models are based merely on location and identity parameters, context-aware applications seldom cater for users’ situated knowledge and experience of specific contexts. This is a general user problem in well-known, but yet dynamic, user environments. Drawing on a sequential multimethod study of in-car navigation, this paper explores the role of situated knowledge in designing and using context-aware applications. This focus is motivated by the current lack of empirical investigations of context-aware applications in actual use settings. In-car navigation systems are a type of context-aware application that includes a set of contextual parameters for supporting route guidance in a volatile context. The paper outlines a number of theoretical and practical implications for context-aware application design and use.
APA, Harvard, Vancouver, ISO, and other styles
2

Hsu, Ching-Hsien. "Internet of People and situated computing." Personal and Ubiquitous Computing 20, no. 6 (November 2016): 847–49. http://dx.doi.org/10.1007/s00779-016-0957-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dey, Anind K., Gerd Kortuem, David R. Morse, and Albrecht Schmidt. "Situated Interaction and Context-Aware Computing." Personal and Ubiquitous Computing 5, no. 1 (February 2001): 1–3. http://dx.doi.org/10.1007/pl00000013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kolodziej, Joanna, and Fatos Xhafa. "Supporting situated computing with intelligent multi-agent systems." International Journal of Space-Based and Situated Computing 1, no. 1 (2011): 30. http://dx.doi.org/10.1504/ijssc.2011.039105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cristea, Valentin, Ciprian Dobre, Alexandru Costan, and Florin Pop. "Middleware and architectures for space-based and situated computing." International Journal of Space-Based and Situated Computing 1, no. 1 (2011): 43. http://dx.doi.org/10.1504/ijssc.2011.039106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Swan, Karen, Annette Kratcoski, Pat Mazzer, and Jason Schenker. "Bringing Mohamed to the Mountain: Situated Professional Development in a Ubiquitous Computing Classroom." Journal of Educational Computing Research 32, no. 4 (June 2005): 353–65. http://dx.doi.org/10.2190/2gmu-ag3t-q3cc-ge5d.

Full text
Abstract:
This article describes an ongoing situated professional development program in which teachers bring their intact classes for an extended stay in a ubiquitous computing environment equipped with a variety of state-of-the-art computing devices. The experience is unique in that it not only situates teacher learning about technology integration in their regular practice, but also gives them the opportunity to explore the full possibilities afforded by a variety of technologies and 1:1 computing opportunities. The program provides an important alternative model for professional development that has been highly successful, not only in increasing teachers' knowledge and confidence in technology integration but also in changing the ways in which teachers think about and use a variety of technologies in their classrooms. Findings also suggest that ubiquitous computing environments afford unique teaching and learning opportunities upon which ordinary classroom teachers can capitalize to a greater or lesser degree.
APA, Harvard, Vancouver, ISO, and other styles
7

Spencer, Amy. "Reading Ambient Literature: Immersion, Distraction, and the Situated Reading Experience." Poetics Today 42, no. 2 (June 1, 2021): 301–15. http://dx.doi.org/10.1215/03335372-8883276.

Full text
Abstract:
Abstract This article considers the experience and process of reading works of ambient literature, a form of situated literary experience delivered by pervasive computing platforms, responding to the presence of a physically situated reader to deliver a story. This form of situated digital work does not need to be bound by a material form, such as a printed book. Without such a framing device, and its position embedded in the physical world, this narrative form has boundaries that are often in flux. It can shift and respond to the presence of the situated reader, and its beginning and ending can become blurred. This article addresses the specifics of this fluid literary form, open to distraction and unpredictability for the reader, and examines the potential of a reading experience informed by pervasive and ubiquitous computing practices. In doing so, it draws on Ulrich Schmidt's notions of distraction and immersion in relation to the position of the reader. In particular, it addresses the idea that attention can dissolve in two opposite directions, toward a lack of concentration or toward an absorbed trance, a time of focused concentration and immersion, and explores how in ambient literature these become literary devices that lead and shape the reader's experience.
APA, Harvard, Vancouver, ISO, and other styles
8

Sentance, Sue, and Simon Humphreys. "Understanding professional learning for Computing teachers from the perspective of situated learning." Computer Science Education 28, no. 4 (October 2, 2018): 345–70. http://dx.doi.org/10.1080/08993408.2018.1525233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pham, Thai-Lai, Georg Schneider, Stuart Goose, and Arturo Pizano. "Composite Device Computing Environment: A Framework for Situated Interaction Using Small Screen Devices." Personal and Ubiquitous Computing 5, no. 1 (February 28, 2001): 25–28. http://dx.doi.org/10.1007/s007790170024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Carruthers, Rebecca. "Critiques of Knowing: Situated Textualities in Science, Computing and the Arts by Lynette Hunter." Canadian Journal for Studies in Discourse and Writing/Rédactologie 17, no. 2 (January 1, 2002): 70–74. http://dx.doi.org/10.31468/cjsdwr.488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Babu, R., K. Jayashree, and R. Abirami. "Fog Computing Qos Review and Open Challenges." International Journal of Fog Computing 1, no. 2 (July 2018): 109–18. http://dx.doi.org/10.4018/ijfc.2018070104.

Full text
Abstract:
Internet of Things (IoT) enables inters connectivity among devices and platforms. IoT devices such as sensors, or embedded systems offer computational, storage, and networking resources and the existence of these resources permits to move the execution of IoT applications to the edge of the network and it is known as fog computing. It is able to handle billions of Internet-connected devices and is well situated for real-time big data analytics and provides advantages in advertising and personal computing. The main issues in fog computing includes fog networking, QoS, interfacing and programming model, computation offloading, accounting, billing and monitoring, provisioning and resource management, security and privacy. A particular research challenge is the Quality of Service metric for fog services. Thus, this paper gives a survey of cloud computing, discusses the QoS metrics, and the future research directions in fog computing.
APA, Harvard, Vancouver, ISO, and other styles
12

Wei, Yan Li, Han Zhao, and Zhong Lu Cao. "Construction of Mobile Learning Network System Based on Cloud Computing." Applied Mechanics and Materials 631-632 (September 2014): 1451–56. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.1451.

Full text
Abstract:
Distributed computing and Resource sharing in large-scale heterogeneous system are the key to realize mobile learning system. This paper sets up a mobile learning service system through the construction of teaching cloud platform and cloud resources, cloud resource sharing, application and service of cloud resource, system and mechanism construction. The mobile learning network system is established by building models of it, which realizes mobile learning, collaborative learning and the situated learning anytime anywhere with freedom, individuality and diversification.
APA, Harvard, Vancouver, ISO, and other styles
13

Tolvaly-Rosca, Ferenc, and Zoltán Forgó. "Computing Algorithm for the Gear Tooth Space Points Cloud Envelope Generated by the Mixed Cad Method." MACRo 2015 2, no. 1 (October 1, 2017): 113–20. http://dx.doi.org/10.1515/macro-2017-0013.

Full text
Abstract:
AbstractThe task of the mixed pure CAD generating method developed by the authors consists in finding only the points situated on the gear tooth surface. The use of the mixed CAD gear generating method results in a very large and particular type of Points Cloud: This contains points situated both in the tooth space, and on the tooth surface. The existing filtering programs and methods, as it was presented in previous papers, cannot deal with these particular point sets. The development of the named particular generating method claims an algorithm and a computer software which can find the envelope of the Points Cloud. This papers presents an Alpha Shape algorithm based filtering algorithm, adapted and developed to be used together with the mixed CAD generating software.
APA, Harvard, Vancouver, ISO, and other styles
14

Pardesi, Hitesh, and Naveen Kumari. "Study of Various Multi Keyword Search in Cloud Computing." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 318. http://dx.doi.org/10.23956/ijarcsse.v7i8.80.

Full text
Abstract:
With the approach of cloud computing, data proprietors are induced to outsource their important information administration systems from adjacent spots to the business open cloud for proficient flexibility. As needs be, enabling a mixed cloud data look organization is of crucial essentialness. Considering the colossal number of data customers and documents in the cloud, it is vital to allow diverse watchwords in the chase request and return reports in the demand of their relevance to these catchphrases. Related wears down accessible encryption focus on single watchword chase or Boolean catchphrase look for, and sometimes sort the rundown things. In this paper, we describe and deal with the testing issue of insurance defending multi-catchphrase situated look for over encoded data in disseminated computing (MRSE).
APA, Harvard, Vancouver, ISO, and other styles
15

Tang, Tao, Yuyin Ma, and Wenjiang Feng. "Probabilistic-QoS-Aware Multi-Workflow Scheduling Upon the Edge Computing Resources." International Journal of Web Services Research 18, no. 2 (April 2021): 25–39. http://dx.doi.org/10.4018/ijwsr.2021040102.

Full text
Abstract:
Edge computing is an evolving decentralized computing infrastructure by which end applications are situated near the computing facilities. While the edge servers leverage the close proximity to the end-users for provisioning services at reduced latency and lower energy costs, their capabilities are constrained by limitations in computational and radio resources, which calls for smart, quality-of-service (QoS) guaranteed, and efficient task scheduling methods and algorithms. For addressing the edge-environment-oriented multi-workflow scheduling problem, the authors consider a probabilistic-QoS-aware approach to multi-workflow scheduling upon edge servers and resources. It leverages a probability-mass function-based QoS aggregation model and a discrete firefly algorithm for generating the multi-workflow scheduling plans. This research conducted an experimental case study based on varying types of workflow process models and a real-world dataset for edge server positions. It can be observed the method clearly outperforms its peers in terms of workflow completion time, cost, and deadline violation rate.
APA, Harvard, Vancouver, ISO, and other styles
16

Ashima, Ashima, and Mrs Navjot Jyoti. "ENHANCING JOB ALLOCATION USING NBST IN CLOUD ENVIRONMENT: A REVIEW." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 3 (June 7, 2017): 6247–53. http://dx.doi.org/10.24297/ijct.v16i3.6182.

Full text
Abstract:
Cloud computing is a vigorous technology by which a user can get software, application, operating system and hardware as a service without actually possessing it and paying only according to the usage. Cloud Computing is a hot topic of research for the researchers these days. With the rapid growth of Interne technology cloud computing have become main source of computing for small as well big IT companies. In the cloud computing milieu the cloud data centers and the users of the cloud-computing are globally situated, therefore it is a big challenge for cloud data centers to efficiently handle the requests which are coming from millions of users and service them in an efficient manner. Load balancing is a critical aspect that ensures that all the resources and entities are well balanced such that no resource or entity neither is under loaded nor overloaded. The load balancing algorithms can be static or dynamic. Load balancing in this environment means equal distribution of workload across all the nodes. Load balancing provides a way of achieving the proper utilization of resources and better user satisfaction. Hence, use of an appropriate load balancing algorithm is necessary for selecting the virtual machines or servers. This paper focuses on the load balancing algorithm which distributes the incoming jobs among VMs optimally in cloud data centers. In this paper, we have reviewed several existing load balancing mechanisms and we have tried to address the problems associated with them.
APA, Harvard, Vancouver, ISO, and other styles
17

Bresnihan, Nina, Aibhín Bray, Lorraine Fisher, Glenn Strong, Richard Millwood, and Brendan Tangney. "Parental Involvement in Computer Science Education and Computing Attitudes and Behaviours in the Home: Model and Scale Development." ACM Transactions on Computing Education 21, no. 3 (May 10, 2021): 1–24. http://dx.doi.org/10.1145/3440890.

Full text
Abstract:
This work is situated in research on Parental Involvement (PI) in Computer Science (CS) Education. While the importance of PI in children's education is well established, most parents have little experience in CS and struggle to facilitate the learning of a child in the area. If PI in CS Education is to happen, then we argue that parents need support and that understanding the current behaviours and attitudes toward CS in the family context is important to discerning the form that support should take. This article therefore describes the development of an instrument to identify factors relating to parental attitudes toward and motivation for PI in CS education. Relevant variables situated in the context of parental computing behaviours and attitudes in the home were identified using a literature review and expert focus group. These include computing usage, availability, confidence, and experience. To measure these variables, a survey instrument was developed and administered to a large sample of parents ( n = 1228). Results of exploratory and confirmatory factor analysis confirm that the instrument measures five constructs, namely “Confidence,” measuring parental confidence levels with computing; “Attitude to PI”; “Motivation for PI”; and two types of “Usage”: Creation and Consumption. Results of Pearson correlation revealed significant positive relationships between confidence and both positive attitudes toward, and motivation for, PI, with linear regressions confirming that confidence was a significant predictor of both. Regression analysis also identified that creative usage was a predictor of positive attitudes to PI, and that programming experience was a predictor of attitude to, and motivation for, PI. These findings were further validated through triangulation with qualitative data from focus groups with the target population. We conclude that this understanding of the predictors of PI attitudes and motivation should inform the design of initiatives to address parental engagement in CS Education.
APA, Harvard, Vancouver, ISO, and other styles
18

Chawla, Ishaan. "Cloud Computing Environment: A Review." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 2 (August 29, 2018): 7261–72. http://dx.doi.org/10.24297/ijct.v17i2.7674.

Full text
Abstract:
Cloud computing is a vigorous technology by which a user can get software, application, operating system and hardware as a service without actually possessing it and paying only according to the usage. Cloud Computing is a hot topic of research for the researchers these days. With the rapid growth of Internet technology cloud computing have become main source of computing for small as well big IT companies. In the cloud computing milieu the cloud data centers and the users of the cloud-computing are globally situated, therefore it is a big challenge for cloud data centers to efficiently handle the requests which are coming from millions of users and service them in an efficient manner.Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure "in the cloud" that supports them. Scheduling is one of the core steps to efficiently exploit the capabilities of heterogeneous computing systems. On cloud computing platform, load balancing of the entire system can be dynamically handled by using virtualization technology through which it becomes possible to remap virtual machine and physical resources according to the change in load. However, in order to improve performance, the virtual machines have to fully utilize its resources and services by adapting to computing environment dynamically. The load balancing with proper allocation of resources must be guaranteed in order to improve resource utility. Load balancing is a critical aspect that ensures that all the resources and entities are well balanced such that no resource or entity neither is under loaded nor overloaded. The load balancing algorithms can be static or dynamic. Load balancing in this environment means equal distribution of workload across all the nodes. Load balancing provides a way of achieving the proper utilization of resources and better user satisfaction. Hence, use of an appropriate load balancing algorithm is necessary for selecting the virtual machines or servers. This paper focuses on the load balancing algorithm which distributes the incoming jobs among VMs optimally in cloud data centers. In this paper, we have reviewed several existing load balancing mechanisms and we have tried to address the problems associated with them.
APA, Harvard, Vancouver, ISO, and other styles
19

Sundaram, P. Meenakshi. "SCFE: A Superior Conveyed Framework Engineering For Secure Administration Oriented Computing." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 29, 2017): 80. http://dx.doi.org/10.23956/ijarcsse.v7i7.102.

Full text
Abstract:
In this manuscript, we exhibit SCFE, an elite disseminated framework engineering for secure administration arranged figuring. SCFE incorporates a novel administration situated application display whereupon security and disconnection strategies are inferred and implemented. The workhorse of SCFE is a custom system interface controller, called the Network Management Unit (NMU), that implements SCFE's security and separation strategies while giving elite system get to. SCFE's application display fulfils the unpredictable cooperation of present day vast scale disseminated applications. Our experimentation comes about demonstrate that notwithstanding when executed on substantial bunches, the NMU includes an immaterial message idleness of 41ns under reasonable workloads and 66ns at the 99th percentile of most pessimistic scenario get to designs. Our examination demonstrates that the NMU can without much of a stretch help more than 100 Gbps with a solitary rationale motor and that more than 500 Gbps is achievable with more forceful plans. SCFE's administration arranged security and disconnection component evacuates high overheads forced by current frameworks. SCFE enables appropriated applications to work in a situation with fine-grained security and segregation while encountering supercomputer-like system execution.
APA, Harvard, Vancouver, ISO, and other styles
20

Hwang, Amy S., Khai N. Truong, Jill I. Cameron, Eva Lindqvist, Louise Nygård, and Alex Mihailidis. "Co-Designing Ambient Assisted Living (AAL) Environments: Unravelling the Situated Context of Informal Dementia Care." BioMed Research International 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/720483.

Full text
Abstract:
Ambient assisted living (AAL) aims to help older persons “age-in-place” and manage everyday activities using intelligent and pervasive computing technology. AAL research, however, has yet to explore how AAL might support or collaborate with informal care partners (ICPs), such as relatives and friends, who play important roles in the lives and care of persons with dementia (PwDs). In a multiphase codesign process with six (6) ICPs, we envisioned how AAL could be situated to complement their care. We used our codesigned “caregiver interface” artefacts astriggersto facilitate envisioning of AAL support and unpack the situated, idiosyncratic context within which AAL aims to assist. Our findings suggest that AAL should be designed to support ICPs in fashioning “do-it-yourself” solutions that complement tacitly improvised care strategies and enable them to try, observe, and adapt to solutions over time. In this way, an ICP could decide which activities to entrust to AAL support, when (i.e., scheduled or spontaneous) and how a system should provide support (i.e., using personalized prompts based on care experience), and when adaptations to system support are needed (i.e., based alerting patterns and queried reports). Future longitudinal work employing participatory, design-oriented methods with care dyads is encouraged.
APA, Harvard, Vancouver, ISO, and other styles
21

Redishettywar, Kavita, and Prof Rafik Juber Thekiya. "AN ENHANCED TASK ALLOCATION STRATEGY IN CLOUD ENVIRONMENT." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 6 (August 18, 2017): 6953–61. http://dx.doi.org/10.24297/ijct.v16i6.6304.

Full text
Abstract:
Cloud computing is a vigorous technology by which a user can get software, application, operating system and hardware as a service without actually possessing it and paying only according to the usage. Cloud Computing is a hot topic of research for the researchers these days. With the rapid growth of Interne technology cloud computing have become main source of computing for small as well big IT companies. In the cloud computing milieu the cloud data centers and the users of the cloud-computing are globally situated, therefore it is a big challenge for cloud data centers to efficiently handle the requests which are coming from millions of users and service them in an efficient manner. Load balancing ensures that no single node will be overloaded and used to distribute workload among multiple nodes. It helps to improve system performance and proper utilization of resources. We propose an improved load balancing algorithm for job scheduling in the cloud environment using K-Means clustering of cloudlets and virtual machines in the cloud environment. All the cloudlets given by the user are divided into 3 clusters depending upon client’s priority, cost and instruction length of the cloudlet. The virtual machines inside the datacenter hosts are also grouped into multiple clusters depending upon virtual machine capacity in terms of processor, memory, and bandwidth. Sorting is applied at both the ends to reduce the latency. Multiple number of experiments have been conducted by taking different configurations of cloudlets and virtual machine. Various parameters like waiting time, execution time, turnaround time and the usage cost have been computed inside the cloudsim environment to demonstrate the results. Compared with the other job scheduling algorithms, the improved load balancing algorithm can outperform them according to the experimental results.
APA, Harvard, Vancouver, ISO, and other styles
22

Walther, W., M. Gorsler, J. Poltz, and D. Bock. "The Application of Information about Conductivity in the Computing of Ion Concentrations, Illustrated by Certain Surface Waters Situated in Lower Saxony." Water Science and Technology 17, no. 6-7 (June 1, 1985): 833–41. http://dx.doi.org/10.2166/wst.1985.0183.

Full text
Abstract:
The electrical conductivity and pH value are, amongst other parameters, continuously recorded in monitoring stations at important surface waters in Lower Saxony. The data are directly transmitted to the surveillance centre in Hildesheim. This paper deals with the estimates of concentrations of the most important ions in water by using mathematical models. The basis for the calculations are the conductivity and, in case of a eutrophic lake, the pH value as well. The methods are demonstrated by using data from the river Weser and from the shallow lake Dümmer. The Weser is one of the main rivers in Lower Saxony. It is heavily polluted by potash mine wastes.
APA, Harvard, Vancouver, ISO, and other styles
23

Schefer-Wenzl, Sigrid, and Igor Miladinovic. "A Course Design for Individualized Learning Leveraging Didactic Functions of Mobile Learning Devices." International Journal of Advanced Corporate Learning (iJAC) 10, no. 2 (November 9, 2017): 30. http://dx.doi.org/10.3991/ijac.v10i2.7352.

Full text
Abstract:
Mobile computing and wireless technologies are transforming traditional educational patterns. The use of mobile devices for educational purposes led to what is known as <em>mobile learning</em>. In recent years, mobile learning strategies have been increasingly adopted in higher education. They support personalized, informal, situated, contextualized and ubiquitous learning. In practice, we have witnessed that courses in software engineering education often do not lead to the expected learning outcomes. In this paper, we will therefore present a motivating and learner-centered approach for mobile e-learning in application prototyping. We use mobile devices as key enabler serving different didactic functions in the context of learning, prototyping and collaboration.
APA, Harvard, Vancouver, ISO, and other styles
24

R. Bulli Babu, Dr, P. Jagadeesh, and S. Sonia. "Cloud computing based personal health records by using data encryption." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 367. http://dx.doi.org/10.14419/ijet.v7i2.7.10721.

Full text
Abstract:
Unique wellbeing record (PHR)1 will be kept up in the bound together server should keep up the patients near home and PHR administra-tions would outsourced should outcast pro co-ops. Those essential concerns may be around examination information. Those tolerant records ought to make if those patients Might truly control those advertising kept up with helter-skelter2 security which is more security. The securi-ty plans are used to protect that particular information from general population get. Tolerant information could make accessed Eventually Tom's perusing A large number distinctive individuals. Each power will be doled out with right reasonably for a specific situated of qualities. The entry control and protection management is an intricate assignment in the tolerant wellbeing record oversaw economy methodology. Conveyed registering may be a casual statement used to depict a combination about Different sorts about registering thoughts that incorpo-rate endless that would chortle through a continuous correspondence a. It may be an identical word to passed on preparing over an arrange-ment and methods those abilities will run a system around a number chortled Pcs meanwhile majority of the data proprietors invigorate those singular data under outcast cloud server ranches. Those novel patient-driven framework Also a suited from claiming data get will instruments will control PHR1 set far over semi-put stock Previously, servers. On finish fine-grained What's more versant majority of the data get will control to PHRs, we utilize quality built encryption (ABE) methodologies on scramble each patient's PHR1 record. Different data proprietors3 camwood get should comparable data values. Those recommended arrangement Might a chance to be arrived at out to pro-gressive quality built encryption (HABE) for get to control part.
APA, Harvard, Vancouver, ISO, and other styles
25

Gracia Sáez, Raúl, and Nicolás Medrano Marqués. "LDMOS versus GaN RF Power Amplifier Comparison Based on the Computing Complexity Needed to Linearize the Output." Electronics 8, no. 11 (November 1, 2019): 1260. http://dx.doi.org/10.3390/electronics8111260.

Full text
Abstract:
In order to maximize the efficiency of telecommunications equipment, it is necessary that the radio frequency (RF) power amplifier is situated as closely as possible to its compression point. This makes its response nonlinear, and therefore it is necessary to linearize it, in order to minimize the interference that nonlinearities cause outside the useful band (adjacent channel). The system used for this linearization occupies a high percentage of the hardware and software resources of the telecommunication equipment, so it is interesting to minimize its complexity in order to make it as simple as possible. This paper analyzes the differences between the laterally diffused MOSFET (LDMOS) and gallium nitride (GaN) power amplifiers, in terms of their nonlinearity graphs, and in terms of the greater or lesser difficulty of linearization. A correct choice of power amplifier will allow for minimization of the linearization system, greatly simplifying the complexity of the final design.
APA, Harvard, Vancouver, ISO, and other styles
26

Pazo Martín, Carlos, Francisco Aguayo González, María Estela Peralta Álvarez, Mariano Marcos Bárcena, and María Jesús Ávila Gutiérrez. "Innovations in Learning and Teaching for Manufacturing Engineering under Ubiquitous Computing and Distributed on Mobile Devices Smartphones and Tablets." Materials Science Forum 903 (August 2017): 84–91. http://dx.doi.org/10.4028/www.scientific.net/msf.903.84.

Full text
Abstract:
The new technologies of information and communication have opened up new possibilities for training in the field of manufacturing engineering. Information and communications technology contribute to flexible process of teaching and learning thanks to the ease of creating, processing and dissemination of content. They are also an opportunity to improve new learning environments, closer to actual production contexts. But to achieve an efficient process of learning, methodologies (that are based on ICT) should be adapted to the students’ characteristics, the contents and the context. This paper aims to design a model of teaching and learning from educational innovation with the use of information technologies applied to training Manufacturing Engineer using mobile devices as a teaching resource. The tool will be designed to self-education situated in learning contexts and incorporates different instructional strategies for student learning and teacher monitoring.
APA, Harvard, Vancouver, ISO, and other styles
27

Lunn, Stephanie, Leila Zahedi, Monique Ross, and Matthew Ohland. "Exploration of Intersectionality and Computer Science Demographics." ACM Transactions on Computing Education 21, no. 2 (June 2021): 1–30. http://dx.doi.org/10.1145/3445985.

Full text
Abstract:
Although computing occupations have some of the greatest projected growth rates, there remains a deficit of graduates in these fields. The struggle to engage enough students to meet demands is particularly pronounced for groups already underrepresented in computing, specifically, individuals that self-identify as a woman, or as Black, Hispanic/Latinx, or Native American. Prior studies have begun to examine issues surrounding engagement and retention, but more understanding is needed to close the gap, and to broaden participation. In this research, we provide quantitative evidence from the Multiple-Institution Database for Investigating Engineering Longitudinal Development—a longitudinal, multi-institutional database to describe participation trends of marginalized groups in computer science. Using descriptive statistics, we present the enrollment and graduation rates for those situated at the intersection of race/ethnicity and gender between 1987 and 2018. In this work, we observed periods of significant flux for Black men and women, and White women in particular, and consistently low participation of Hispanic/Latinx and Native American men and women, and Asian women. To provide framing for the evident peaks and valleys in participation, we applied historical context analysis to describe the political, economic, and social factors and events that may have impacted each group. These results put a spotlight on populations largely overlooked in statistical work and have the potential to inform educators, administrators, and researchers about how enrollments and graduation rates have changed over time in computing fields. In addition, they offer insight into potential causes for the vicissitudes, to encourage more equal access for all students going forward.
APA, Harvard, Vancouver, ISO, and other styles
28

Seifert, Uwe. "Empirical Aesthetics, Computational Cognitive Modeling, and Experimental Phenomenology: Methodological remarks on “Shaping and Co-Shaping Forms of Vitality in Music: Beyond Cognitivist and Emotivist Approaches to Musical Expressiveness” by Jin Hyun Kim." Empirical Musicology Review 8, no. 3-4 (October 24, 2013): 178. http://dx.doi.org/10.18061/emr.v8i3-4.3939.

Full text
Abstract:
The core ideas of the proposed framework for empirical aesthetics are interpreted as focusing on processes, interaction, and phenomenological experience. This commentary first touches on some methodological impediments to developing theories of processing and interaction, and emphasizes the necessity of computational cognitive modeling using robots to test the empirical adequacy of such theories. Further, the importance of developing and integrating phenomenological methods into current experimental research is stressed, using experimental phenomenology as reference. Situated cognition, affective computing, human-robot interaction research, computational cognitive modeling and social and cultural neuroscience are noted as providing relevant insight into the empirical adequacy of current theories of cognitive and emotional processing. In the near future these fields will have a stimulating impact on empirical aesthetics and research on music and the mind.
APA, Harvard, Vancouver, ISO, and other styles
29

Chung, Dang Huu. "Suspended sediment concentration distribution in an alluvial channel flow." Vietnam Journal of Mechanics 16, no. 1 (March 31, 1994): 15–19. http://dx.doi.org/10.15625/0866-7136/10150.

Full text
Abstract:
In this paper a numerical solution for the problem on suspended sediment concentration distribution in an alluvial channel flow has been computed on the base of PROFILE model proposed by L. C. Van Rijn for the case of uniform flow. Although, in the present case, mathematical model is quite simple, but it is exact enough to apply to Somme problems in practice. The aim of the paper is that the author would like to use the finite difference method for the same problem. The input data was used from experiment flume. The result showed that the concentration distribution fast decreased along the channel and concentration gradients became very small at the sections situated far enough from the upstream. Besides, a computing program me with the ability of graphic expression was established.
APA, Harvard, Vancouver, ISO, and other styles
30

Spencer, Amy. "Literary Thresholds: Exploring the Edges of Ambient Literature." Matlit Revista do Programa de Doutoramento em Materialidades da Literatura 6, no. 1 (August 10, 2018): 149–58. http://dx.doi.org/10.14195/2182-8830_6-1_10.

Full text
Abstract:
This paper examines the use of thresholds as a feature of ambient literature to explore this emerging literary form and its literary roots. The Ambient Literature project is a two year AHRC funded research programme coordinated by three universities in the UK (UWE Bristol, Bath Spa and Birmingham) to investigate the potential of situated literary experiences delivered by pervasive computing platforms, which respond to the presence of a reader to deliver story. The project has commissioned three works of ambient literature from established writers to understand the form, the experiences of its readers and the process of its authoring. This paper will address the positions of form, reader and author and argue that the emergence of ambient literature can extend the understanding of literature and textuality while drawing on the heritage of electronic literature.
APA, Harvard, Vancouver, ISO, and other styles
31

Kansoh, Rawya, Mohamed Abd-El-Mooty, and Rania Abd-El-Baky. "Computing the Water Budget Components for Lakes by Using Meteorological Data." Civil Engineering Journal 6, no. 7 (July 1, 2020): 1255–65. http://dx.doi.org/10.28991/cej-2020-03091545.

Full text
Abstract:
Lake Mariout located between the longitudes of 29° 49′ and 29° 56′E and latitudes of 31° 04′ and 31° 08′N in Egypt. It is situated on the southern side of Alexandria City, Egypt. The land surrounding the lake is occupied by agriculture field, population zones and fish farms. This makes the lake to serve as a sink to drain different kinds of drainage waters from surrounding catchment areas of Alexandria City. The water of Lake Mariout is pumped to the Mediterranean Sea through El-Max pump station. The water budget was computed by measuring or estimating all of the lake’s water gains and losses. Applying the hydrology budget balance for lakes takes the interaction between the inflow and the outflow water from lakes into account. It is very useful for conservation and better management of water resources. All water budget components of the lake are estimated. Groundwater amount is the most difficult component to be measured or estimated in the water budget equation. Most of the previous studies assumed that the residual of water budget to be the groundwater flow to the lake. The results show that the lake Mariout receives approximately 8.95 m3/d from the main drains which represents the major part of the inflow water to lake. The discharge of El-max pump station is also one of the largest components of the outflow water (102 m3/s), while the water loss by evaporation represents 3.2% of the outflow water from the lake. Moreover, the water gain by rainfall 0.38% of the inflow water. The Groundwater flow to/out the lake was estimated as a residual of the water budget equation. It represents 1.2% of the total inputs for the lake water budget. The result shows that the lake is under severe environmental pressure. One of that is the groundwater comes from catchments areas which may be affect the configuration and operating system management of El-Max pump station by the time running.
APA, Harvard, Vancouver, ISO, and other styles
32

Wei, Chih-Chiang, and Tzu-Hao Chou. "Typhoon Quantitative Rainfall Prediction from Big Data Analytics by Using the Apache Hadoop Spark Parallel Computing Framework." Atmosphere 11, no. 8 (August 17, 2020): 870. http://dx.doi.org/10.3390/atmos11080870.

Full text
Abstract:
Situated in the main tracks of typhoons in the Northwestern Pacific Ocean, Taiwan frequently encounters disasters from heavy rainfall during typhoons. Accurate and timely typhoon rainfall prediction is an imperative topic that must be addressed. The purpose of this study was to develop a Hadoop Spark distribute framework based on big-data technology, to accelerate the computation of typhoon rainfall prediction models. This study used deep neural networks (DNNs) and multiple linear regressions (MLRs) in machine learning, to establish rainfall prediction models and evaluate rainfall prediction accuracy. The Hadoop Spark distributed cluster-computing framework was the big-data technology used. The Hadoop Spark framework consisted of the Hadoop Distributed File System, MapReduce framework, and Spark, which was used as a new-generation technology to improve the efficiency of the distributed computing. The research area was Northern Taiwan, which contains four surface observation stations as the experimental sites. This study collected 271 typhoon events (from 1961 to 2017). The following results were obtained: (1) in machine-learning computation, prediction errors increased with prediction duration in the DNN and MLR models; and (2) the system of Hadoop Spark framework was faster than the standalone systems (single I7 central processing unit (CPU) and single E3 CPU). When complex computation is required in a model (e.g., DNN model parameter calibration), the big-data-based Hadoop Spark framework can be used to establish highly efficient computation environments. In summary, this study successfully used the big-data Hadoop Spark framework with machine learning, to develop rainfall prediction models with effectively improved computing efficiency. Therefore, the proposed system can solve problems regarding real-time typhoon rainfall prediction with high timeliness and accuracy.
APA, Harvard, Vancouver, ISO, and other styles
33

Divya, P., M. Saikiran, K. Nagarjuna, K. V.D. Kiran, and Ch V.Phani Krishna. "detection of indulgence attack adopting multivariate correlation analysis." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 230. http://dx.doi.org/10.14419/ijet.v7i2.7.10586.

Full text
Abstract:
Different types of the servers such as Net, data, distributed computing and then forth, has been mutually connected. In current days all these servers are covered twist from the arranged aggressors. More often than of universal & commanding esteems, “Denial-of-Service” (DoS) offensive purpose honest tremble on figuring schemes. Here, I can display a framework of the DoS assault location which uses the Multivariate Correlation Analysis that is shortly called as MCA as long as the system movement factual replica of through dividing relationships based on geometric within system activity main features. Implemented “DoS assault identification framework based on MCA” uses a irregular condition situated place in the acknowledgment of the assault. it accomplishes settlement fit to catch insoluble & certified “DoS assaults” modestly with the help of the research samples of the “true blue system activity”.
APA, Harvard, Vancouver, ISO, and other styles
34

Bessis, Nik, Eleana Asimakopoulou, Peter Norrington, Suresh Thomas, and Ravi Varaganti. "A Next Generation Technology Victim Location and Low Level Assessment Framework for Occupational Disasters Caused by Natural Hazards." International Journal of Distributed Systems and Technologies 2, no. 1 (January 2011): 43–53. http://dx.doi.org/10.4018/jdst.2011010104.

Full text
Abstract:
Much work is underway within the broad next generation technologies community on issues associated with the development of services to support interdisciplinary domains. Disaster reduction and emergency management are domains in which utilization of advanced information and communication technologies (ICT) are critical for sustainable development and livelihoods. In this article, the authors aim to use an exemplar occupational disaster scenario in which advanced ICT utilization could present emergency managers with some collective computational intelligence in order to prioritize their decision making. To achieve this, they adapt concepts and practices from various next generation technologies including ad-hoc mobile networks, Web 2.0, wireless sensors, crowd sourcing and situated computing. On the implementation side, the authors developed a data mashup map, which highlights the criticality of victims at a location of interest. With this in mind, the article describes the service architecture in the form of data and process flows, its implementation and some simulation results.
APA, Harvard, Vancouver, ISO, and other styles
35

Hauser, Vladimír, Olena S. Nozhenko, Kateryna O. Kravchenko, Mária Loulová, Juraj Gerlici, and Tomáš Lack. "Car body and bogie connection modification for track curves passability improvement." MATEC Web of Conferences 157 (2018): 03009. http://dx.doi.org/10.1051/matecconf/201815703009.

Full text
Abstract:
For Tram cars, it is often necessary to operate in cities on strongly curved track, which is followed by an increased effect of the vehicle on the track. Especially, this increased effect occurs in spiral transition curves situated between direct and arc sections or between two arc sections of different radius. In such case, increased guiding forces, creep in the rail - wheel contact, wear and noise generation can be observed. Exactly with the aim to reduce these undesirable effects we designed a tram bogie with steered wheelsets. This paper deals with a modification of its coupling to vehicle body in order to improve vehicle dynamics in transition curves. Proposed innovative construction of this coupling unit is registered by authors under Utility Model Nr. u201609015 and Utility Model Nr. u201703246. Description of the proposed way for a vehicle to pass through curved track with regard to bogie-body coupling and wheelset steering mechanisms with usage of multibody computing software is given in this paper.
APA, Harvard, Vancouver, ISO, and other styles
36

HEWAGAMAGE, K. PRIYANTHA, MASAHITO HIRAKAWA, and TADAO ICHIKAWA. "SITUATION-DEPENDENT METAPHOR FOR PERSONAL MULTIMEDIA INFORMATION." International Journal of Software Engineering and Knowledge Engineering 09, no. 06 (December 1999): 725–43. http://dx.doi.org/10.1142/s0218194099000383.

Full text
Abstract:
Recently available low-cost personal computers and mechanisms to produce digital data have caused a staggering increase in the amount of multimedia data acquired by the user. Hence, the user's personal information space that consists of a large collection of files, may distribute over a number of computers. Situation-dependent metaphor methodology, described in this paper, provides a novel approach to managing such a collection with respect to the context of user's interactions with data. By considering the mobile computing environment, the physical location, time periods and activities are primarily used in modeling the situation metaphor. Sensors and software agents are used in capturing contextual factors automatically. Situation Space describes the theoretical foundation for the situation metaphor based information organization. We also presents our prototype engineered model, Situated Information Filing and Filtering (SIFF), to demonstrate the situation-dependent data management. The SIFF provides the framework for organizing the personal information and developing applications that require contextual information.
APA, Harvard, Vancouver, ISO, and other styles
37

Baan, Mirko van der. "Processing of anisotropic data in the τ-p domain: II — Common-conversion-point sorting." GEOPHYSICS 70, no. 4 (July 2005): D29—D36. http://dx.doi.org/10.1190/1.1993708.

Full text
Abstract:
Common-conversion-point (CCP) sorting of P-SV converted-wave data is conventionally done by first sorting data into common asymptotic-conversion-point (CACP) gathers and then computing the involved CCP shifts from analytic approximations. I explore an alternative method where the latter step is replaced by an entirely data-driven approach. Moveout curves of correlated P-P and P-SV reflections in collocated CMP and CACP gathers are first scanned for points of equal slowness. A common-source slowness indicates that the downgoing branches of the P-P and P-SV waves overlap if the conversion occurs at the reflecting interface. The P-SV conversion point is then assumed to be situated underneath the associated P-P wave midpoint. A migration of amplitudes from CACP to CCP gathers is straightforward once the exact CCP position is known. This data-driven approach requires kinematic information only and is exact for laterally homogeneous media with arbitrary strength of anisotropy if horizontal symmetry planes are present at all depths. Both time-offset and τ-p domain implementations are possible, although the latter are preferred.
APA, Harvard, Vancouver, ISO, and other styles
38

Derbiszewski, Bogdan, and Anna Kurek. "Analysis of granulometric dust accumulating in supply and exhaust ventilation filters." E3S Web of Conferences 44 (2018): 00030. http://dx.doi.org/10.1051/e3sconf/20184400030.

Full text
Abstract:
The research aim was to analyse and compare the composition of granulometric dust which accumulates in air filters located in central air handling units supporting the production rooms and at the same time the degree and a kind of contamination fraction of atmospheric air in a part of Wrocław situated outside the city centre. Samples were taken in different seasons of the year, such as March and October. The size of pollution particles extracted from ventilation filters was measured with the use of ANALYSETTE 22MicroTec plus laser particle sizer produced by FRITSCH. The results of measurements were generated with MaScontrol software for particle size analysis. In computing research results, the Fraunhofer diffraction theory was used. The comparison of the examined air particles’ size in an air supply canal allowed to determine the outside air dust size in Szczepin district on Długa street in Wrocław. Moreover, the influence of the year season on the size of contaminants accumulating in filters was also determined in the course of research works.
APA, Harvard, Vancouver, ISO, and other styles
39

De Michelis, Giorgio. "La lezione di Steve Jobs: una riflessione italiana." STUDI ORGANIZZATIVI, no. 2 (May 2012): 201–14. http://dx.doi.org/10.3280/so2011-002008.

Full text
Abstract:
In this paper we discuss the lesson that the legacy of Steve Jobs as an entrepreneur leaves to us, with a particular attention to what we, in Italy, can learn from it. Three are the issues we take into consideration: innovation, organization and sustainability. With respect to the first of them, we compare the way Apple has created its innovative products with the innovation done by other companies like Google and Facebook, to argue that Jobs was practicing at a very high quality level interaction design. With respect to organization, we stress that Jobs has paid great attention to the creation of durable company and we suggest a parallel between him and Adriano Olivetti. Finally, we show that sustainability has been considered as important, but after the quality of products. We conclude the paper with two provoking claims: first, we claim that Apple can be considered as a representative of the Italian Way of Doing Industry; second, we suggest a new perspective to create innovative applications of ICT, beyond Apple, called situated computing.
APA, Harvard, Vancouver, ISO, and other styles
40

Et. al., Vijaya Kumbhar,. "Least Afflicted Load Balancing Algorithm (LALBA) for Performance Improvement of Multi-Scale Applications in Cloud Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1709–20. http://dx.doi.org/10.17762/turcomat.v12i2.1507.

Full text
Abstract:
Cloud computing is new image of Information Technology and the way applications are available to end-users. Also, the applications available are gaining popularity as being able to demonstrate the flexibility of use of resources as in Multi-Scale Cloud-Based Applications. These applications on the cloud are hosted on remote virtual machines with multi-tenancy architecture. Multi-tenant cloud computing architecture helps cloud users and customers to share computing resources and still the individual tenant's data is stored separately so as to make it is invisible to other tenants. With this multi-tenancy architecture, the application is being used by multiple people at the same time. Also, the application resides in various copies across various servers situated at different geographical locations. Virtual Machines that are housed in multiple Data Centers are coupled by way of load balancers. These load balancers are responsible for the optimal distribution of load/demand/tenant requests and the size of the data held within the request. So in short, two areas need to be focused on when architecting such systems. Firstly, the load must be balanced optimally across data centers and virtual machines for seamless operation at the back end. Secondly, at the front end, it is imperative that every tenant enjoys optimal service speeds without any degradation of service request speed. In case the back-end virtual machines are unbalanced in their load then there is bound to be degradation of services. For this very purpose, various researchers/academicians, and practitioners in the cloud space have been working tirelessly towards developing optimal algorithms to get the best load balancing architecture to ensure that the objective of seamless back end and front end quality of service in terms of average response times. Multi-Scale applications consist of variable payload for time and often unpredictable i.e. load can be increased/decreased suddenly or gradually. Hence to balance these loads equally at any time, a new algorithm is proposed. This algorithm considers the characteristics of multiscale applications in terms of data size and runtime characteristics of VM in terms of capacity and availability. Finally, the performance of this method is analyzed qualitatively as well as quantitatively by performing simulation experiments of multiscale applications.
APA, Harvard, Vancouver, ISO, and other styles
41

Landowski, Bogdan. "Method of modelling operation and maintenance processes in public transport systems using a certain class of stochastic processes." MATEC Web of Conferences 332 (2021): 01005. http://dx.doi.org/10.1051/matecconf/202133201005.

Full text
Abstract:
The study presents a method for application of the theory Markov homogenous processes for modeling of the process of vehicle operational state changes characterized by exponential distribution of their duration time. A model of operation and maintenance of vehicles used in the research object has been developed. The research object is a city bus transport system situated in the analyzed agglomeration. Stochastic process {X(t), t = 0} is a mathematical model of the process of operation and maintenance of public transport buses. The analyzed stochastic process {X(t),t = 0} has a finite phase space S, S={S1, S2, ..., Sn}. It was assumed that operation of the model is to be described by the homogeneous Markov process {X(t) : t ? R+} with a finite set of S states. The states of the analyzed stochastic process correspond to the operational states distinguished for a bus. A hypothetical computing model was built in order to illustrate the discussion and present a method for application of the developed model. The parameters of the model were estimated based on the analysis of initial results of experimental tests conducted in a real bus transport system.
APA, Harvard, Vancouver, ISO, and other styles
42

Bello, Y. A., K. M. Lawal, B. B. M. Dewu, and A. E. Ikpokonte. "LAND SURFACE TEMPERATURE INVESTIGATION AROUND IKOGOSI WARM SPRING NIGERIA USING LANDSAT8 DATA." FUDMA JOURNAL OF SCIENCES 5, no. 2 (July 6, 2021): 264–72. http://dx.doi.org/10.33003/fjs-2021-0502-583.

Full text
Abstract:
Ikogosi warm spring (IWS) is among the most visited geothermal resource by tourists in Nigeria. On that basis, it has attracted so much attention from researchers using various geophysical methods, except the retrieval of the land surface temperature (LST) from remote sensing data. This work aimed at computing LST to delineate hot zone around Ikogosi geothermal resources. The split-window approach was used to compute the LST from Landsat 8 data. The interpretation of Landsat8 data revealed that the central region of the study area is of high LST, and the temperature then drops towards the southwest direction. The result also shows that the warm spring is situated around a region with high land surface temperature (about 29 °C) which is an indication of a geothermal reservoir. The supervised classification of the LST yields two zones of the high density of pixels with high temperature, hot spot zones. The hot spot zone west of IWS is believed to be the heat source of IWS as it has high LST, and it is closer to IWS while the hot spot zone NW of IWS shows an indication of a viable geothermal resource, high LST
APA, Harvard, Vancouver, ISO, and other styles
43

Luis, Alvarinho J., and Shubham Singh. "High-resolution multispectral mapping facies on glacier surface in the Arctic using WorldView-3 data." Czech Polar Reports 10, no. 1 (August 7, 2020): 23–36. http://dx.doi.org/10.5817/cpr2020-1-3.

Full text
Abstract:
Glaciers are important and sensitive part of our environment which can be used as indicator of global warming and climate change. Glacier facies represent distinct regions of a glacier surface characterized by near surface structure and density that develop as a function of spatial variations in surface melt and accumulation. The facies mapping aids in delineating different zones of the glacier, which are useful in computing glacier mass balance and modeling. In this study we tested traditional and advanced classification techniques on the Edithbreen glacier situated in Ny-lesund, Svalbard, using WorldView-3 and Landsat 8 OLI. The comparison of the accuracy was conducted using error matrices. Six measures of accuracy were derived from the error matrices and were compared with each other to find the method delivering the most adequate output for facies mapping. The pixel-based approach applied to Landsat-8 data yielded higher accuracies (>80%) when compared to that. The object-oriented classification revealed a much better accuracy and high kappa coefficient for both low and high-resolution datasets. The study clearly indicates that the object-oriented classification provides better results for glacier facies classification when high spatial resolution is used, but for lower spatial resolution, pixel-based methods are adequate.
APA, Harvard, Vancouver, ISO, and other styles
44

E. Abel, Edje, Abd Latiff Muhammad Shafie, and Weng Howe Chan. "Deployment of internet of things-based cloudlet-cloud for surveillance operations." IAES International Journal of Artificial Intelligence (IJ-AI) 10, no. 1 (March 1, 2021): 24. http://dx.doi.org/10.11591/ijai.v10.i1.pp24-34.

Full text
Abstract:
This research proposes the design of internet of things (IoT) camera/toxic gas sensors for the surveillance of a nation’s borders. Also, a wearable radio frequency identification (RFID) tag with built-in body-temperature/heartbeat sensors, for monitoring the health status and locations of military personnel while on border patrol duty or in battlefield combats. Mobile micro-controllers are deployed to gather sensed data retrieved from the sensors/RFID tags and transmitted to a cloudlet situated at the command control center, located 200 meters away from the sensor devices. Consequently, sensed data are dispatch to the cloud data center when there is a need for offline data mining or analysis. The distinguishing feature of our proposed system from previous researches is that the health status and locations of troops (soldiers) are monitored while they are in border patrol duty or in battlefield combats. Also, the introduction of cloudlet services closer to the IoT sensor devices for collection of sensed data. This way, the sensed data or information gathered at the cloudlet will aid timely information retrieval that will speed up intelligence gathering for strategic military operations, especially in critical situations. This is an innovative attempt to apply IoT-enabled cloudlet-based cloud computing to support military operations.
APA, Harvard, Vancouver, ISO, and other styles
45

Qasim, Jamal, and Abdul Mannan Khan. "Use of e-journals by the scientists of CSIR-Institute of Genomics and Integrative Biology (IGIB), Delhi, India." Electronic Library 33, no. 5 (October 5, 2015): 928–42. http://dx.doi.org/10.1108/el-07-2014-0107.

Full text
Abstract:
Purpose – The purpose of this paper is to analyze the use of electronic journals (e-journals) by the scientists of Council of Scientific and Industrial Research-Institute of Genomics and Integrative Biology (CSIR-IGIB) – a center of excellence in the field of genomics and integrative biology situated in Delhi, India. Design/methodology/approach – The paper is based on the results of a well-structured questionnaire administered to all the scientists of the institute for the purpose of data collection. Findings – The main findings are that the scientists are more attracted toward e-journals specially on those provided by CSIR-NISCAIR Consortia, NKRC than those available via direct subscription. From this survey, the investigator has been able to find out that almost all the scientists are consulting e-journals from their campus cabin, not only for research purposes but also to update their own knowledge. The infrastructure to use e-journals are superb and there is no technological problem specially hardware and software support with high bandwidth of Internet speed exists here, as CSIR-IGIB uses largest computing facility (four Tflop/s) in Asia outside Japan (ranked 158th among the World’s Top 500 Super Computers). Respondents also identified that there is dire need for training in using e-resources and retrieving pinpointed information from the databases. Research limitations/implications – The present paper consists only of scientists and the geographical area is restricted to CSIR-IGIB, Delhi. The scope of the paper can be extended to additional CSIR libraries. A comparative study can also be made among some biological research libraries of CSIR Institutes. Originality/value – There are a number of studies on the use of e-journals by CSIR scientists, but this is the first of its kind which covers scientists of IGIB that has the largest computing facility (four Tflop/s) in Asia outside Japan. As such, it should pave the way for research and lead a model role for other CSIR Institutes as well as elsewhere.
APA, Harvard, Vancouver, ISO, and other styles
46

Vance, Jason M. "Mining reference chat transcripts to analyze noise complaints." Reference Services Review 46, no. 4 (November 12, 2018): 578–86. http://dx.doi.org/10.1108/rsr-11-2017-0042.

Full text
Abstract:
Purpose This case study provides a new methodology for examining patron-initiated noise complaints in academic libraries by mining virtual reference chat transcript logs. The purpose of this study is to illustrate how noise complaints can be identified, analyzed and mapped to create a visual representation of the library’s soundscape. Design/methodology/approach This study reviewed 4,494 reference chat logs taken over four semesters at a large public university between August 2015 and May 2017. From these transcripts, the author identified 330 unique noise complaints and analyzed them by content, time of day, day of week, week of semester and floor of library. Complaints were also plotted on a library map to determine noise complaint hot spots. Findings Analysis of the noise complaints showed that 82 per cent of the reported incidents originated in designated quiet study zones and 55 per cent of the complaints occurred in the evenings when the library was more lightly staffed. Mapping the noise complaints revealed that most infractions were reported in areas where public computing areas and group study rooms were situated directly adjacent to designated quiet study areas. Originality/value Although there are numerous studies on noise in libraries and many published analyses of reference chat transcripts, this paper is the first to analyze chat transcripts for the purpose of studying noise complaints in the library. This paper is an expansion of a preliminary study presented at the 2016 Library Assessment Conference in Arlington, VA.
APA, Harvard, Vancouver, ISO, and other styles
47

Quinay, Pher Errol B., John Michael M. Soliman, and Aileen Rachelle F. Fader. "Development of Simulation-Based Approach Using Frame Models Generated From GIS Features and BIM Data for Application to City Seismic Response Analysis of Low- to Mid-Rise RC Structures in Metro Manila." Journal of Earthquake and Tsunami 14, no. 06 (August 6, 2020): 2050021. http://dx.doi.org/10.1142/s1793431120500219.

Full text
Abstract:
Many cities in the Philippines are situated near fault systems that can generate large magnitude of earthquakes. This paper describes the development of a city seismic response analysis approach for Metro Manila’s low- to mid-rise RC structures using frame models which are generated from GIS feature or BIM data. To create the three-dimensional (3D) models, features and structural details from BIM are used. Finite element method was used to discretize the models with mesh of line elements. Validations of generated models were conducted by comparing the results with those obtained using solid finite element model, commercial software and experimental test. The developed approach was applied to a scenario earthquake analysis wherein the causative fault is the West Valley Fault. Two cities within Metro Manila, that vary in distribution of low- and mid-rise building and site condition, were analyzed. The results of statistical analysis show that the variations in distribution of maximum interstory drift (ISD) between cities and between floor levels, are influenced by the height and floor plan area of the structures. Visualizations in both city-level and building-level reveal the areas that are critical for the considered scenario earthquake. Analysis of the computation costs shows that using frame models for response analysis of each city in Metro Manila leads to million-order degrees-of-freedom (DoF) to solve, and necessitates the implementation of data partitioning and high performance computing techniques.
APA, Harvard, Vancouver, ISO, and other styles
48

Deebalakshmi, R., and V. L. Jyothi. "Intelligent Packet Delivery in Router Using Structure Optimized Neural Network." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 2 (May 1, 2018): 545. http://dx.doi.org/10.11591/ijeecs.v10.i2.pp545-553.

Full text
Abstract:
The Internet itself is a worldwide network connecting millions of computers and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at gateways, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carries out this by using headers and routing tables to establish the best path for routing the data packets. This trim down the effectiveness of edge router only when the path engaged, it will enhanced by classification method, predictable classification methods like port based ,deep packet inspection and statistical classification are give less precision. In this system structured optimized neural network is used for more precise organization. Classification output forwarded to router dynamically for intellectual packet delivery. The method will improve router competence by greater than before throughput and decreased latency.<span style="font-size: 9.0pt; line-height: 115%; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; letter-spacing: .05pt; mso-ansi-language: EN-IN; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold; mso-bidi-font-style: italic;" lang="EN-IN">The Internet itself is a worldwide <a href="https://www.webopedia.com/TERM/I/network.htm"><span style="color: windowtext; text-decoration-line: none;">network</span></a> connecting millions of <a href="https://www.webopedia.com/TERM/I/computer.htm"><span style="color: windowtext; text-decoration-line: none;">computers</span></a> and less significant networks. Computers communicated by routers. Crucial the role of a router is to our technique of communicating and computing. Routers are situated at <a href="https://www.webopedia.com/TERM/G/gateway.html"><span style="color: windowtext; text-decoration-line: none;">gateways</span></a>, the spaces where two or more networks connect, and are the decisive device that keeps data flow between networks and keeps the networks connected to the Internet. When data is sent between places on one network or from one network to a second network the data is always seen and intended for to the proper place by the router. The router carries out this by using <a href="https://www.webopedia.com/TERM/R/header.htm"><span style="color: windowtext; text-decoration-line: none;">headers</span></a> and routing tables to establish the best path for routing the data packets. This trim down the effectiveness of edge router only when the path engaged, it will enhanced by classification method, predictable classification methods like port based ,deep packet inspection and statistical classification are give less precision. In this system structured optimized neural network is used for more precise organization. Classification output forwarded to router dynamically for intellectual packet delivery. The method will improve router competence by greater than before throughput and decreased latency.</span>
APA, Harvard, Vancouver, ISO, and other styles
49

POZRIKIDIS, C. "Computation of the pressure inside bubbles and pores in Stokes flow." Journal of Fluid Mechanics 474 (January 10, 2003): 319–37. http://dx.doi.org/10.1017/s0022112002002641.

Full text
Abstract:
Numerical methods are discussed for computing the pressure inside a two- or three-dimensional inviscid bubble with negligible density suspended in Stokes flow, subject to a specified rate of expansion. In the case of flow past a solitary two- or three-dimensional bubble, the bubble pressure is found by solving an integral equation of the first kind for the normal derivative of the pressure on the side of the liquid over the free surface, while requiring that the pressure field decays at a rate that is faster than the potential due to a point source. In another approach, an explicit expression for the bubble pressure is derived by applying the reciprocal theorem for the flow around the bubble and the flow due to a point source situated inside the bubble. In the case of flow past, or due to the expansion or shrinkage of, a periodic lattice of bubbles, the bubble pressure is found by solving an integral equation of the second kind for the density of an interfacial distribution of point-source dipoles, while ensuring existence and uniqueness of solution by spectrum deflation. The new methods considerably simplify the computation of the bubble pressure by circumventing the evaluation of the finite part of hypersingular integrals. Results of numerical simulations illustrate the pressure developing inside a solitary two- and three-dimensional incompressible bubble suspended in simple shear flow, and the pressure developing inside a doubly periodic array of gaseous inclusions representing shrinking pores trapped in a sintered medium.
APA, Harvard, Vancouver, ISO, and other styles
50

David, Cédric H., David R. Maidment, Guo-Yue Niu, Zong-Liang Yang, Florence Habets, and Victor Eijkhout. "River Network Routing on the NHDPlus Dataset." Journal of Hydrometeorology 12, no. 5 (October 1, 2011): 913–34. http://dx.doi.org/10.1175/2011jhm1345.1.

Full text
Abstract:
Abstract The mapped rivers and streams of the contiguous United States are available in a geographic information system (GIS) dataset called National Hydrography Dataset Plus (NHDPlus). This hydrographic dataset has about 3 million river and water body reaches along with information on how they are connected into networks. The U.S. Geological Survey (USGS) National Water Information System (NWIS) provides streamflow observations at about 20 thousand gauges located on the NHDPlus river network. A river network model called Routing Application for Parallel Computation of Discharge (RAPID) is developed for the NHDPlus river network whose lateral inflow to the river network is calculated by a land surface model. A matrix-based version of the Muskingum method is developed herein, which RAPID uses to calculate flow and volume of water in all reaches of a river network with many thousands of reaches, including at ungauged locations. Gauges situated across river basins (not only at basin outlets) are used to automatically optimize the Muskingum parameters and to assess river flow computations, hence allowing the diagnosis of runoff computations provided by land surface models. RAPID is applied to the Guadalupe and San Antonio River basins in Texas, where flow wave celerities are estimated at multiple locations using 15-min data and can be reproduced reasonably with RAPID. This river model can be adapted for parallel computing and although the matrix method initially adds a large overhead, river flow results can be obtained faster than with the traditional Muskingum method when using a few processing cores, as demonstrated in a synthetic study using the upper Mississippi River basin.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography