Search results for " computing"

showing 10 items of 2075 documents

Numerical methods for a nonlinear impact model: A comparative study with closed-form corrections

2011

A physically based impact model-already known and exploited in the field of sound synthesis-is studied using both analytical tools and numerical simulations. It is shown that the Hamiltonian of a physical system composed of a mass impacting on a wall can be expressed analytically as a function of the mass velocity during contact. Moreover, an efficient and accurate approximation for the mass outbound velocity is presented, which allows to estimate the Hamiltonian at the end of the contact. Analytical results are then compared to numerical simulations obtained by discretizing the system with several numerical methods. It is shown that, for some regions of the parameter space, the trajectorie…

sound synthesis0209 industrial biotechnologyMathematical optimizationnumerical analysisaudio signal processingAcoustics and UltrasonicsDiscretizationComputer sciencePhysical system02 engineering and technologyParameter spaceEnergy conservationsymbols.namesake020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringComputer simulationSettore INF/01 - Informaticasound synthesis; numerical analysis; audio signal processingNumerical analysisMathematical analysisphysics computing020207 software engineeringimpact modelingimpact soundsEnergy conservationNonlinear systemnumerical simulationsymbolsnonlinear dynamical systemHamiltonian (quantum mechanics)
researchProduct

SEMANTIC AND CONTEXTUAL APPROACH FOR THE RECOMMENDATION OF LEARNING MODULES IN MOBILITY

2012

International audience; Many researchers argue that mobile learning is just an adaptation of e-learning on mobile technology, but far from a simple extension of e-learning, m-learning raises original issues in technological and pedagogical terms. M-learning is usually based on the consideration of a context rich on information and interactions. The challenge of m-learning is therefore, not simply to transfer on mobile content designed primarily for e-learning. This concept implies that we must rethink the entire process of the learning experience in mobility to maximize its efficiency.

spatiotemporal contextmetaheuristics[ INFO.INFO-IU ] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-LG] Computer Science [cs]/Machine Learning [cs.LG][ INFO.INFO-LG ] Computer Science [cs]/Machine Learning [cs.LG][INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MC]Computer Science [cs]/Mobile Computing[INFO.INFO-MC] Computer Science [cs]/Mobile Computing[INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG]learner's profile[ INFO.INFO-MC ] Computer Science [cs]/Mobile Computinglearner's profile.ontologym-learningRecommender system
researchProduct

Recommender system for combination of learning elements in mobile environment

2012

5 pages; International audience; The paper presents an ongoing research about the development of a new recommender system dedicated to m-learning. This system is an extension of content based recommender system proposals. It's made of three levels architecture: 1/ a domain model describing the knowledge of teaching, 2/ a user model defining learner's profile and learning's context, 3/ an adaptation model containing rules and metaheuristics, which aims at combining learning modules. Our system takes into account the spatio-temporal context of the learners, the evolution of learner's profile and the dynamic adaptation of modules during the learning process in a mobile environment. The result …

spatiotemporal contextmetaheuristics[ INFO.INFO-IU ] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-LG] Computer Science [cs]/Machine Learning [cs.LG][ INFO.INFO-LG ] Computer Science [cs]/Machine Learning [cs.LG][INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MC]Computer Science [cs]/Mobile Computing[INFO.INFO-MC] Computer Science [cs]/Mobile Computing[INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG]learner's profile[ INFO.INFO-MC ] Computer Science [cs]/Mobile Computingontologym-learningRecommender system
researchProduct

Performance Improvements of EventIndex Distributed System at CERN

2023

El trabajo de esta tesis se enmarca dentro del proyecto EventIndex del experimento ATLAS, un gran detector de partı́culas del LHC (Gran Colisionador de Hadrones) en el CERN. El objetivo del proyecto es catalogar todas las colisiones de partı́culas, o eventos, registrados en el detector ATLAS y también simulados a lo largo de sus años de funcionamiento. Con este catálogo se pueden caracterizar los datos a nivel de evento para su búsqueda y localización por parte de los usuarios finales. También se pueden realizar comprobaciones en la cadena de registro y reprocesado de los datos, para comprobar su corrección y optimizar futuros procesos. Debido al incremento en las tasas y volumen de datos e…

storagedistributed computingUNESCO::CIENCIAS TECNOLÓGICAS::Tecnología de los ordenadores ::Dispositivos de almacenamientobig dataDetectors and Experimental TechniquesgridUNESCO::CIENCIAS TECNOLÓGICAS::Tecnología de los ordenadores ::Arquitectura de ordenadoresComputing and Computers
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct

Implementation techniques for the lattice Boltzmann method

2010

suurteholaskentavirtauslaskentamesoscopic methodsmesoskooppinen alueHila-Boltzmann -menetelmäcomputational fluid dynamicsvirtausdynamiikkalattice Boltzmann methodboundary conditionsalgoritmitcomputer simulationCDFsimulointiHigh performance computingmathematical modellingmatemaattiset mallittietojenkäsittelylaskentamenetelmät
researchProduct

Positive Computing as Paradigm to Overcome Barriers to Global Co-authoring of Open Educational Resources

2018

The adoption of Open Educational Resources (OER) can support collaboration and knowledge sharing. One of the main areas of the usage OER is the internationalization, i.e., the use in a global context. However, the globally distributed co-creation of digital materials is still low. Therefore, we identify essential barriers, in particular for co-authoring of OER in global environments. We use a design science research method to introduce a barrier framework for co-authoring OER in global settings and propose a wellbeing-based system design constructed from the barrier framework for OER co-authoring tool. We describe how positive computing concepts can be used to overcome barriers, emphasizing…

system designKnowledge managementopen educational resourcesComputer sciencemedia_common.quotation_subjectlicenseslcsh:Telecommunicationlcsh:TK5101-6720open educationCompetence (human resources)media_commonta113OER co-authoringbusiness.industrymobile handsetsknowledge managementPositive computingOpen educational resourcescollaborationKnowledge sharingavoimet oppimateriaalitInternationalizationauthoring systemsSystems designknowledge co-creationDesign science researchbusinesspositive computingAutonomy
researchProduct

Efficacy of the cloud computing technology in the management of communications and business processes of the companies

2016

W artykule zbadano tendencje rozwoju i stosowania różnych klas systemów informatycznych w zarządzaniu w relacji do rodzajów procesów biznesowych. Zaprezentowano krótki przegląd aktualnego stanu wykorzystania technologii chmury obliczeniowej na świecie i na Ukrainie. Korzyści wynikające z zastosowania modelu "SaaS - Software as a Service" zostały wyjaśnione na przykładzie innowacji międzynarodowego projektu "Bitrix 24", w którym zrealizowane zostały główne cele systemów CRM w połączeniu z szerokimi możliwościami koordynacji procesów komunikacyjnych i biznesowych nowoczesnych firm. Projekt ten został przetłumaczony na większość języków europejskich i wykorzystuje narzędzia społecznego środowi…

systemy CRMCRMsystemscloud computing technologiesspołeczny Intranetcommunicationssocial Intranetzarządzanie procesami biznesowymikomunikacjasystemy ERPERP-systemsbusiness processes managementtechnologie chmury obliczeniowejPolish Journal of Management Studies
researchProduct

Supporting Cyber Resilience with Semantic Wiki

2016

Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…

ta113021110 strategic defence & security studiesEngineeringKnowledge managementCloud computing securitybusiness.industryStandard of Good Practiceinformation security management0211 other engineering and technologies02 engineering and technologyInformation securitycyber resiliencesemantic wikiSecurity information and event managementrisk managementSecurity controlsResilience (organizational)World Wide WebITIL security managementInformation security management020204 information systems0202 electrical engineering electronic engineering information engineeringbusiness
researchProduct

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct