Search results for "Computer technology"
showing 10 items of 40 documents
Fish Sperm Assessment Using Software and Cooling Devices
2018
For gamete quality evaluation, there are innovative, rapid, and quantitative techniques that can provide useful data for aquaculture. Computerized systems for sperm analysis were developed to measure several parameters and one of the most commonly measured is the sperm motility. Initially, this computer technology was designed for mammalian species, although it can also be used for fish sperm analysis. Fish have specific features that can affect sperm assessment such as a short motility time after activation and, in some cases, adaptation to lower temperatures. Thus, it is necessary to modify both software and hardware components to make motility analysis more efficient for fish sperm analy…
Virtual Museum Net
2006
A project named ”Virtual Museum Net of Magna Graecia” is presented, whose objective is to provide an unitary image of the archaeological heritage of Calabria (a Southern Italian region), through Computer Technology, Multimedia Designing and Virtual Reconstructions. The project aims to encourage the technological transfer of the most advanced researches in the exploitation and conservation sector of the Cultural Heritage. The ”Virtual Museum Net of Magna Graecia” project is included in the context of Knowledge Media Design for Museums. This project links the museum scenery and multimedia, in order to use technology as system of representation.
The Dreaming Variational Autoencoder for Reinforcement Learning Environments
2018
Reinforcement learning has shown great potential in generalizing over raw sensory data using only a single neural network for value optimization. There are several challenges in the current state-of-the-art reinforcement learning algorithms that prevent them from converging towards the global optima. It is likely that the solution to these problems lies in short- and long-term planning, exploration and memory management for reinforcement learning algorithms. Games are often used to benchmark reinforcement learning algorithms as they provide a flexible, reproducible, and easy to control environment. Regardless, few games feature a state-space where results in exploration, memory, and plannin…
A two-armed bandit collective for hierarchical examplar based mining of frequent itemsets with applications to intrusion detection
2014
Published version of a chapter in the book: Transactions on Computational Collective Intelligence XIV. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-662-44509-9_1 In this paper we address the above problem by posing frequent item-set mining as a collection of interrelated two-armed bandit problems. We seek to find itemsets that frequently appear as subsets in a stream of itemsets, with the frequency being constrained to support granularity requirements. Starting from a randomly or manually selected examplar itemset, a collective of Tsetlin automata based two-armed bandit players - one automaton for each item in the examplar - learns which items should be included in …
Supporting fine-grained generative model-driven evolution
2010
Published version of an article in the journal: Software and Systems Modeling. Also available on SpringerLink:http://dx.doi.org/10.1007/s10270-009-0144-1 In the standard generative Model-driven Architecture (MDA), adapting the models of an existing system requires re-generation and restarting of that system. This is due to a strong separation between the modeling environment and the runtime environment. Certain current approaches remove this separation, allowing a system to be changed smoothly when the model changes. These approaches are, however, based on interpretation of modeling information rather than on generation, as in MDA. This paper describes an architecture that supports fine-gra…
Computational modeling in cognitive science: a manifesto for change.
2012
Computational modeling has long been one of the traditional pillars of cognitive science. Unfortunately, the computer models of cognition being developed today have not kept up with the enormous changes that have taken place in computer technology and, especially, in human-computer interfaces. For all intents and purposes, modeling is still done today as it was 25, or even 35, years ago. Everyone still programs in his or her own favorite programming language, source code is rarely made available, accessibility of models to non-programming researchers is essentially non-existent, and even for other modelers, the profusion of source code in a multitude of programming languages, written witho…
EMI shielding effects of carbon nanotube cellulose nanocomposite
2010
Electromagnetic interference shielding is an important aspect of modern communication and computer technology. Carbon nanotube cellulose nanocomposite (CNTCNC) provides a novel material as an alternative to traditional metal-based shields for EMI shielding. Stratified structures containing CNTCNC layers combined with existing commercial lossy materials (like ferrite sheets) form effective EMI shields without lowering the signal integrity performance. Significant improvement in shielding effectiveness in stacked CNTCNC layers is noteworthy. CNTCNC is essentially like paper when it comes to flexibility and hence it can be easily conformed to the mechanical structure of the device in need of s…
Graduate of Riga Polytechnic Institute, Engineer and Athlete Mārtiņš Stabiņš
2020
The aim of the article is to reveal the performance of Mārtiņš Stabiņš, a graduate of the Faculty of Automation and Computer Technology (1972; FACT) of Riga Polytechnic Institute (RPI), in the profession of engineer and high achievements in sports, becoming a Latvian champion in athletics several times, to reveal his daily life during his study years in the 1960s–1970s. Despite the fact that M. Stabiņš’ sports achievements have already described, this article summarizes his successes as well as reveals hitherto little-known and unpublished documents about his family, daily life, developments and interests. This is the first major research on the life of an engineer and athlete during seven …
Laser driven quantum rings: one byte logic gate implementation
2018
We study the effect of the carrier-envelope-phase (CEP) on the high harmonic generation (HHG) from a quantum ring driven by two short orthogonal lasers polarized along the x and y axes. In particular, by varying only the phase of the laser polarized along y it is possible to control the intensity of the emitted harmonics. In fact, we show that the system can efficiently emit harmonics if the laser polarized along y is small and that the cut-off of the spectra can be controlled by changing the phase or the intensity ratio between the two lasers. The wavelet analysis of the emitted harmonics and the time dependence of the angular momentum and of the energy acquired by the electron show that t…
The effects of self-efficacy on computer usage
1995
Abstract This paper examines the effect of self-efficacy, belief in one's capabilities of using a computer in the accomplishment of specific tasks, on computer usage. It introduces an extended technology acceptance model (TAM) that explicitly incorporates self-efficacy and its determinants (experience and organizational support) as factors affecting computer anxiety, perceived ease of use, perceived usefulness and the use of computer technology. A survey of 450 microcomputer users in Finland found strong support for the conceptual model. In accordance with TAM, perceived usefulness had a strong direct effect on usage, while perceived ease of use had indirect effect on usage through perceive…