Search results for " Computer"
showing 10 items of 6910 documents
Usage activity, perceived usefulness, and satisfaction in a web-based acceptance and commitment therapy program among Finnish ninth-grade adolescents.
2020
Understanding adolescent usage activity and experiences in web-based psychological intervention programs helps in developing universal programs that can be adopted for promotion of adolescent well-being and prevention of mental health problems. This study examined the usage activity, perceived usefulness (i.e., learning of mindfulness, acceptance and value-related skills), and program satisfaction of 157 Finnish ninth-grade adolescents, who participated in a school-based five-week universal acceptance and commitment therapy web intervention called Youth Compass. Individual and growth environment-related antecedents were measured before the five-week intervention, adolescents' usage activity…
Evaluation de la pertinence dans un système de recommandation sémantique de nouvelles économiques
2014
Today in the commercial and financial sectors, staying informed about economic news is crucial and involves targeting good articles to read, because the huge amount of information. To address this problem, we propose an innovative article recommendation system, based on the integration of a semantic description of articles and on a knowledge ontological model. We support our recommendation system on an intrinsically efficient vector model that we have perfected to overcome the confusion existing in models between the concepts of similarity and relevancy that does not take into account the effects of the difference in the accuracy of the semantic descriptions precision between profiles and a…
Experimental generalized quantum suppression law in Sylvester interferometers
2017
Photonic interference is a key quantum resource for optical quantum computation, and in particular for so-called boson sampling machines. In interferometers with certain symmetries, genuine multiphoton quantum interference effectively suppresses certain sets of events, as in the original Hong-Ou-Mandel effect. Recently, it was shown that some classical and semi-classical models could be ruled out by identifying such suppressions in Fourier interferometers. Here we propose a suppression law suitable for random-input experiments in multimode Sylvester interferometers, and verify it experimentally using 4- and 8-mode integrated interferometers. The observed suppression is stronger than what is…
Kohn-Sham Decomposition in Real-Time Time-Dependent Density-Functional Theory An Efficient Tool for Analyzing Plasmonic Excitations
2017
The real-time-propagation formulation of time-dependent density-functional theory (RT-TDDFT) is an efficient method for modeling the optical response of molecules and nanoparticles. Compared to the widely adopted linear-response TDDFT approaches based on, e.g., the Casida equations, RT-TDDFT appears, however, lacking efficient analysis methods. This applies in particular to a decomposition of the response in the basis of the underlying single-electron states. In this work, we overcome this limitation by developing an analysis method for obtaining the Kohn-Sham electron-hole decomposition in RT-TDDFT. We demonstrate the equivalence between the developed method and the Casida approach by a be…
Active lighting applied to three-dimensional reconstruction of specular metallic surfaces by polarization imaging
2006
International audience; In the field of industrial vision, the three-dimensional inspection of highly reflective metallic objects is still a delicate task. We deal with a new automated three-dimensional inspection system based on polarization analysis. We first present an extension of the shape-from-polarization method for dielectric surfaces to metallic surfaces. Then, we describe what we believe to be a new way of solving the ambiguity concerning the normal orientation with an active lighting system. Finally, applications to shape-defect detection are discussed, and the efficiency of the system to discriminate defects on specular metallic objects made by stamping and polishing is presente…
Toward Quaternary QCA : Novel Majority and XOR Fuzzy Gates
2022
As an emerging nanotechnology, quantum-dot cellular automata (QCA) has been considered an alternative to CMOS technology that suffers from problems such as leakage current. Moreover, QCA is suitable for multi-valued logic due to the simplicity of implementing fuzzy logic in a way much easier than CMOS technology. In this paper, a quaternary cell is proposed with two isolated layers because of requiring three particles to design this quaternary cell. Moreover, due to the instability of the basic gates, the three particles cannot be placed in one layer. The first layer of the proposed two-layer cell includes a ternary cell and the second one includes a binary cell. It is assumed that the over…
Enhanced chain dynamics in loop-sorting-systems by means of layout optimization and a kinematic model of the polygon action
2012
Published version of an article in the journal: Structural and Multidisciplinary Optimization. Also available from the publisher at: http://dx.doi.org/10.1007/s00158-011-0743-7 Poor dynamics owing to polygon action is a known concern in mechanical applications of closed articulated chains. In this paper a kinematic model of the polygon action in large chains of loop-sorting-systems is proposed. Through optimization techniques the chain dynamics is improved by minimizing the polygon action using a parametric model of the track layout as design variables. Three formulations of the kinematic polygon action are tested on an average sized planer tracks layout to find a superior model. Verificati…
Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity
2023
Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be a symptom of systematic problems, and a narrow, siloed focus on only fixing immediate issues through technical fixes and controls might preclude other managerial actions to ensure future cybersecurity. Towards this end, Information Security Risk Assessments (ISRA) can help surface other vulnerabilities following a breach. While the role of governance in such exercises is emphasized in standards, it is undertheorized in IS research and lacks empirical evidence. We draw on t…
Prioritizing covariates in the planning of future studies in the meta-analytic framework
2016
Science can be seen as a sequential process where each new study augments evidence to the existing knowledge. To have the best prospects to make an impact in this process, a new study should be designed optimally taking into account the previous studies and other prior information. We propose a formal approach for the covariate prioritization, i.e., the decision about the covariates to be measured in a new study. The decision criteria can be based on conditional power, change of the p-value, change in lower confidence limit, Kullback-Leibler divergence, Bayes factors, Bayesian false discovery rate or difference between prior and posterior expectation. The criteria can be also used for decis…
Energie informatique et choix de matériel
1995
The choice of computers been made according to a minimax: one chooses the most powerful computer in the less powerful category. We show here that, in a simple case, if one takes into account the time of equipment utilization, this rule can be given in cause. We study then a case more complicated including some technical parameters like the case of multiprocessor machine and including other human parameters like the intensity of task submission.