Search results for " Computer"

showing 10 items of 6910 documents

Usage activity, perceived usefulness, and satisfaction in a web-based acceptance and commitment therapy program among Finnish ninth-grade adolescents.

2020

Understanding adolescent usage activity and experiences in web-based psychological intervention programs helps in developing universal programs that can be adopted for promotion of adolescent well-being and prevention of mental health problems. This study examined the usage activity, perceived usefulness (i.e., learning of mindfulness, acceptance and value-related skills), and program satisfaction of 157 Finnish ninth-grade adolescents, who participated in a school-based five-week universal acceptance and commitment therapy web intervention called Youth Compass. Individual and growth environment-related antecedents were measured before the five-week intervention, adolescents' usage activity…

perceived usefulnessusage activityhyväksymis- ja omistautumisterapiaInformation technologyAdolescentsnuoretPsychologyintervention satisfactionadolescentsinterventioverkkopalvelutkäyttäjätutkimusWeb-based interventionhyödyllisyysPerceived usefulnessIntervention satisfactionAcceptance and commitment therapyT58.5-58.64113 Computer and information sciencesFull length ArticleBF1-990Usage activityacceptance and commitment therapytyytyväisyysinterventiohoitoweb-based interventionInternet interventions
researchProduct

Evaluation de la pertinence dans un système de recommandation sémantique de nouvelles économiques

2014

Today in the commercial and financial sectors, staying informed about economic news is crucial and involves targeting good articles to read, because the huge amount of information. To address this problem, we propose an innovative article recommendation system, based on the integration of a semantic description of articles and on a knowledge ontological model. We support our recommendation system on an intrinsically efficient vector model that we have perfected to overcome the confusion existing in models between the concepts of similarity and relevancy that does not take into account the effects of the difference in the accuracy of the semantic descriptions precision between profiles and a…

pertinence[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI][ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR]système de recommandation[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR][ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]ontologie[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]
researchProduct

Experimental generalized quantum suppression law in Sylvester interferometers

2017

Photonic interference is a key quantum resource for optical quantum computation, and in particular for so-called boson sampling machines. In interferometers with certain symmetries, genuine multiphoton quantum interference effectively suppresses certain sets of events, as in the original Hong-Ou-Mandel effect. Recently, it was shown that some classical and semi-classical models could be ruled out by identifying such suppressions in Fourier interferometers. Here we propose a suppression law suitable for random-input experiments in multimode Sylvester interferometers, and verify it experimentally using 4- and 8-mode integrated interferometers. The observed suppression is stronger than what is…

photonicsGeneral Physics and AstronomyQuantum simulatorFOS: Physical sciences02 engineering and technologyInterference (wave propagation)01 natural sciencesSettore FIS/03 - Fisica Della Materiaquantumquantum informationboson sampling0103 physical sciencesQuantum metrologyquantum opticssuppression lawQuantum information010306 general physicsQuantumBosonQuantum computerQuantum opticsPhysicsgeneralized Hong-Ou-Mandel effectintegrated interferometersQuantum Physicsgeneralized Hong-Ou-Mandel effect; integrated interferometers; multi-photon interference; suppression law021001 nanoscience & nanotechnologyLaw0210 nano-technologyQuantum Physics (quant-ph)multi-photon interference
researchProduct

Kohn-Sham Decomposition in Real-Time Time-Dependent Density-Functional Theory An Efficient Tool for Analyzing Plasmonic Excitations

2017

The real-time-propagation formulation of time-dependent density-functional theory (RT-TDDFT) is an efficient method for modeling the optical response of molecules and nanoparticles. Compared to the widely adopted linear-response TDDFT approaches based on, e.g., the Casida equations, RT-TDDFT appears, however, lacking efficient analysis methods. This applies in particular to a decomposition of the response in the basis of the underlying single-electron states. In this work, we overcome this limitation by developing an analysis method for obtaining the Kohn-Sham electron-hole decomposition in RT-TDDFT. We demonstrate the equivalence between the developed method and the Casida approach by a be…

plasmonic excitationsTheoretical computer scienceKohn-Sham decompositionComputer scienceta221Kohn–Sham equationsFOS: Physical sciencesPhysics::Optics02 engineering and technology01 natural sciencesPhysics - Chemical Physics0103 physical sciencesMesoscale and Nanoscale Physics (cond-mat.mes-hall)Decomposition (computer science)Physics::Atomic and Molecular ClustersStatistical physicsPhysical and Theoretical ChemistryPhysics::Chemical Physics010306 general physicsta116PlasmonEigenvalues and eigenvectorsChemical Physics (physics.chem-ph)Condensed Matter - Materials ScienceCondensed Matter - Mesoscale and Nanoscale Physicsta114tiheysfunktionaaliteoriaMaterials Science (cond-mat.mtrl-sci)Time-dependent density functional theory16. Peace & justice021001 nanoscience & nanotechnologyComputer Science ApplicationsplasmonitBenzene derivativesnanohiukkaset0210 nano-technologyJOURNAL OF CHEMICAL THEORY AND COMPUTATION
researchProduct

Active lighting applied to three-dimensional reconstruction of specular metallic surfaces by polarization imaging

2006

International audience; In the field of industrial vision, the three-dimensional inspection of highly reflective metallic objects is still a delicate task. We deal with a new automated three-dimensional inspection system based on polarization analysis. We first present an extension of the shape-from-polarization method for dielectric surfaces to metallic surfaces. Then, we describe what we believe to be a new way of solving the ambiguity concerning the normal orientation with an active lighting system. Finally, applications to shape-defect detection are discussed, and the efficiency of the system to discriminate defects on specular metallic objects made by stamping and polishing is presente…

polarization imagingComputer scienceMaterials Science (miscellaneous)Polishing02 engineering and technologyDielectric[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]01 natural sciencesIndustrial and Manufacturing EngineeringPhotometry010309 opticsImaging Three-DimensionalOptics[INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Image Interpretation Computer-AssistedMaterials Testing0103 physical sciences0202 electrical engineering electronic engineering information engineeringScattering RadiationSpecular reflectionBusiness and International Managementactive lightingLightingScatteringbusiness.industry[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Equipment DesignStampingFresnel equationsPolarization (waves)metallic surfacesEquipment Failure AnalysisMetals020201 artificial intelligence & image processingMicroscopy PolarizationbusinessRefractive indexAlgorithmsshape from polarization
researchProduct

Toward Quaternary QCA : Novel Majority and XOR Fuzzy Gates

2022

As an emerging nanotechnology, quantum-dot cellular automata (QCA) has been considered an alternative to CMOS technology that suffers from problems such as leakage current. Moreover, QCA is suitable for multi-valued logic due to the simplicity of implementing fuzzy logic in a way much easier than CMOS technology. In this paper, a quaternary cell is proposed with two isolated layers because of requiring three particles to design this quaternary cell. Moreover, due to the instability of the basic gates, the three particles cannot be placed in one layer. The first layer of the proposed two-layer cell includes a ternary cell and the second one includes a binary cell. It is assumed that the over…

polarizationquaternaryGeneral Computer SciencekvanttitietokoneetGeneral Engineeringquantum dotsnanotekniikkapotential wellkvanttilaskentaCMOS technologyquantum computinglitografia (mikrovalmistus)XOR fuzzy gatelogic gatesintegrated circuit modelinglithographyGeneral Materials Sciencemulti-valued QCAsumea logiikkamajority fuzzy gateQQCA
researchProduct

Enhanced chain dynamics in loop-sorting-systems by means of layout optimization and a kinematic model of the polygon action

2012

Published version of an article in the journal: Structural and Multidisciplinary Optimization. Also available from the publisher at: http://dx.doi.org/10.1007/s00158-011-0743-7 Poor dynamics owing to polygon action is a known concern in mechanical applications of closed articulated chains. In this paper a kinematic model of the polygon action in large chains of loop-sorting-systems is proposed. Through optimization techniques the chain dynamics is improved by minimizing the polygon action using a parametric model of the track layout as design variables. Three formulations of the kinematic polygon action are tested on an average sized planer tracks layout to find a superior model. Verificati…

polygon actionLoop (graph theory)Mathematical optimizationControl and OptimizationComputer scienceengineeringVDP::Technology: 500::Mechanical engineering: 570SortingKinematicsloop-sorting-systemsComputer Graphics and Computer-Aided DesignAction (physics)Computer Science Applicationsmulti-body dynamicsChain (algebraic topology)Control and Systems EngineeringParametric modelPolygonEngineering design processAlgorithmoptimizationSoftware
researchProduct

Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity

2023

Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be a symptom of systematic problems, and a narrow, siloed focus on only fixing immediate issues through technical fixes and controls might preclude other managerial actions to ensure future cybersecurity. Towards this end, Information Security Risk Assessments (ISRA) can help surface other vulnerabilities following a breach. While the role of governance in such exercises is emphasized in standards, it is undertheorized in IS research and lacks empirical evidence. We draw on t…

post-breach managementtop management teamGeneral Computer Sciencecybersecurity governancerisk assessmentriskinarviointitietotekniikkayrityksetcybersecurity breachattention-based viewtietoturvakyberturvallisuustietomurtojohtoryhmätLawriskittietojärjestelmätComputers & Security
researchProduct

Prioritizing covariates in the planning of future studies in the meta-analytic framework

2016

Science can be seen as a sequential process where each new study augments evidence to the existing knowledge. To have the best prospects to make an impact in this process, a new study should be designed optimally taking into account the previous studies and other prior information. We propose a formal approach for the covariate prioritization, i.e., the decision about the covariates to be measured in a new study. The decision criteria can be based on conditional power, change of the p-value, change in lower confidence limit, Kullback-Leibler divergence, Bayes factors, Bayesian false discovery rate or difference between prior and posterior expectation. The criteria can be also used for decis…

powerMethodology (stat.ME)FOS: Computer and information sciencesdesignmeta-analyysiscientific methodnäyttöön perustuva lääketiedeStatistics - Methodology
researchProduct

Energie informatique et choix de matériel

1995

The choice of computers been made according to a minimax: one chooses the most powerful computer in the less powerful category. We show here that, in a simple case, if one takes into account the time of equipment utilization, this rule can be given in cause. We study then a case more complicated including some technical parameters like the case of multiprocessor machine and including other human parameters like the intensity of task submission.

powerpuissancechoix[ INFO ] Computer Science [cs]informatiquecomputer science[INFO] Computer Science [cs]computer hardwarechoicecomputerinformatique choix puissance énergieénergieenergy
researchProduct