Search results for "Computer Science Applications"
showing 10 items of 3993 documents
Designing and Implementing a CSCL-based Course on the Data Security of a Wireless Learning Environment
2012
This article reports on a design-based research (DBR) process for designing and implementing a computer-supported collaborative learning (CSCL) course on the data security of wireless learning environments. The study focuses on examining how university students practice data security when learning on a wireless campus, how data security aspects appear in this study and how students perceive the role of data security in CSCL. The research subjects included six pilot students and eight students enrolled in the course. To promote the reliability of the findings, various kinds of data were used. The data was analysed following the grounded theory approach. The results suggest that data security…
Expectations and Experiences of Implementing a Mobile Secure Communication Application
2020
The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…
Enablers of and constraints on employees' information sharing on enterprise social media
2020
PurposeThe purpose of this study is to investigate the various enablers of and constraints on employees' information sharing on an enterprise social media platform. It draws on two theoretical perspectives, communication privacy management theory and the technology affordance framework, as well as on empirical data in an attempt to paint a comprehensive picture of the factors shaping employees' decisions to share or not share information on enterprise social media.Design/methodology/approachThis qualitative field study is based on semi-structured interviews and enterprise social media review data from a large Nordic media organization.FindingsOn an enterprise social media platform, privacy …
Increasing stability in the linearized inverse Schrödinger potential problem with power type nonlinearities
2022
We consider increasing stability in the inverse Schr\"{o}dinger potential problem with power type nonlinearities at a large wavenumber. Two linearization approaches, with respect to small boundary data and small potential function, are proposed and their performance on the inverse Schr\"{o}dinger potential problem is investigated. It can be observed that higher order linearization for small boundary data can provide an increasing stability for an arbitrary power type nonlinearity term if the wavenumber is chosen large. Meanwhile, linearization with respect to the potential function leads to increasing stability for a quadratic nonlinearity term, which highlights the advantage of nonlinearit…
Oncogenic BRAF and p53 Interplay in Melanoma Cells and the Effects of the HDAC Inhibitor ITF2357 (Givinostat)
2023
Oncogenic BRAF mutations have been widely described in melanomas and promote tumour progression and chemoresistance. We previously provided evidence that the HDAC inhibitor ITF2357 (Givinostat) targets oncogenic BRAF in SK-MEL-28 and A375 melanoma cells. Here, we show that oncogenic BRAF localises to the nucleus of these cells, and the compound decreases BRAF levels in both the nuclear and cytosolic compartments. Although mutations in the tumour suppressor p53 gene are not equally frequent in melanomas compared to BRAF, the functional impairment of the p53 pathway may also contribute to melanoma development and aggressiveness. To understand whether oncogenic BRAF and p53 may cooperate, a po…
Monotone generalized nonlinear contractions and fixed point theorems in ordered metric spaces
2011
The purpose of this paper is to present some fixed point theorems for T -weakly isotone increasing mappings which satisfy a generalized nonlinear contractive condition in complete ordered metric spaces. As application, we establish an existence theorem for a solution of some integral equations.
Enabling Energy Savings in Offshore Mechatronic Systems by using Self-Contained Cylinders
2019
This paper proposes a novel actuation system for an offshore drilling application. It consists of three self-contained electro-hydraulic cylinders that can share and store regenerated energy. The energy saving potential of the proposed solution is analyzed through a multibody system simulation. The self-contained system demonstrates superior energy efficiency compared to the benchmark system representing the state-of-the-art approach used today (i.e., valve-controlled cylinders by means of pressure-compensated directional control valves and counter-balance valves, supplied by a centralized hydraulic power unit). Due to the power on demand capability, the cancellation of the throttling losse…
Computational Fluid Dynamics (CFD) and Finite Element Analysis (FEM) of a Customized Stent-Graft for Endovascular (EVAR) Treatment of Abdominal Aorti…
2023
Background: The treatment of abdominal aortic aneurysm (AAA) is today commonly treated by inserting a stent-graft by the endovascular route, without resorting to open surgery. However, some clinical cases do not allow this less invasive approach, meaning that the stent-graft cannot be inserted and open surgery is used. Methods: In the study, we propose a fluid–structure interaction (FSI) analysis of an aneurysmatic aorta that could not be treated with Endovascular Aneurysm Repair (EVAR). The vessel is reconstructed through segmentation from CT scans and subsequently modeled on CAD software to create the surface and thickness of the vessel itself. Subsequently, we proceeded to carry out Comp…
Iterative Learning Applied to Hydraulic Pressure Control
2018
This paper addresses a performance limiting phenomenon that may occur in the pressure control of hydraulic actuators subjected to external velocity disturbances. It is demonstrated that under certain conditions a severe peaking of the control error may be observed that significantly degrades the performance of the system due to the presence of nonlinearities. The phenomenon is investigated numerically and experimentally using a system that requires pressure control of two hydraulic cylinders. It is demonstrated that the common solution of feed forwarding the velocity disturbance is not effective in reducing the peaking that occurs as a result of this phenomenon. To improve the system perfor…
Isolation of Four Lytic Phages Infecting Klebsiella pneumoniae K22 Clinical Isolates from Spain
2020
This article belongs to the Special Issue Bacteriophage—Molecular Studies.