Search results for "General Computer Science"

showing 10 items of 895 documents

Towards Ethical Guidelines of Using Telepresence Robots in Residential Care

2021

AbstractRobotic telepresence is a potential technology to help alleviating the loneliness of elderly people. The impacts of long-term use of telepresence robots in residential care are not well known. We were interested in how using a telepresence robot influences the resident, family members and care workers at a facility, and what challenges and solutions there are for wider adoption of such robots in residential care. With a telepresence robot Double, we arranged a series of three trials in two separate residential care facilities: one 12-week trial in a private facility and two successive 6-week trials in a public facility. In each trial, we installed the telepresence robot in a room of…

ethical guidelines020205 medical informaticsGeneral Computer ScienceSocial PsychologyInternet privacyControl (management)vanhuksetresidential care02 engineering and technologytietotekniikkaprivacyelderlyehical guidelinesResidential careyksityisyys0202 electrical engineering electronic engineering information engineeringmedicineElderly peopleElectrical and Electronic EngineeringTeleroboticsbusiness.industrytechnology industry and agricultureLonelinessRoboticseettisyysPrivate Facilitysocial relationshipssosiaaliset suhteetHuman-Computer Interactionbody regionstelepresence robotPhilosophyControl and Systems EngineeringrobotitRobottelevalvonta020201 artificial intelligence & image processingArtificial intelligencehoitokoditmedicine.symptombusinessPsychologyhuman activitiesikääntyneet
researchProduct

The Influence of Student Abilities and High School on Student Growth: A Case Study of Chinese National College Entrance Exam

2019

Enabled by available educational data and data mining techniques, educational data analysis has become a hot topic. Current researches mainly focus on the prediction of problems and performance rather than revealing the underlying causal relationships. Based on a unique exam data, we extracted the abilities of examinee from HSEE (High School Entrance Exam) based on the knowledge of educational experts, then we measured student growth from middle school to high school in total score and subject scores. We studied the impact of high school ranking and student abilities of HSEE on student growth by multiple linear regression model, in which high school ranking is divided into 5 levels, Level 1…

evaluationGeneral Computer Scienceeducational data miningEducational dataeducationGeneral EngineeringEquity (finance)Multiple linear regression modelEducational data miningEntrance examRankingstudent abilityMathematics educationGeneral Materials ScienceActive listeninglcsh:Electrical engineering. Electronics. Nuclear engineeringElectrical and Electronic EngineeringStudent growthlcsh:TK1-9971high school ranking
researchProduct

A non-cooperative approach to the folk rule in minimum cost spanning tree problems

2023

This paper deals with the problem of finding a way to distribute the cost of a minimum cost spanning tree problem between the players. A rule that assigns a payoff to each player provides this distribution. An optimistic point of view is considered to devise a cooperative game. Following this optimistic approach, a sequential game provides this construction to define the action sets of the players. The main result states the existence of a unique cost allocation in subgame perfect equilibria. This cost allocation matches the one suggested by the folk rule. The authors thank the support of the Spanish Ministry of Science, Innovation and Universities, the Spanish Ministry of Economy and Compe…

game theoryInformation Systems and Managementcost allocationGeneral Computer Scienceminimum cost spanning treesubgame perfect equilibriumManagement Science and Operations ResearchUNESCO::CIENCIAS TECNOLÓGICASIndustrial and Manufacturing EngineeringCost allocationGame TheorySubgame perfect equilibriumModeling and SimulationMinimum cost spanning tree
researchProduct

2020

In this paper a comprehensive system-level computational model of oculomotor pathways is presented. This model shows the necessity of embedding internal models of muscles biomechanics in the cerebellar Vermis to realize fast saccadic eye movements based on predicting the changes in muscles lengths. First, the eye biomechanics are described by nonlinear equations during “slow” and “fast” movements. Afterward, by analyzing these equations, a computational model, is deduced. Furthermore, each part of this model is interpreted as a possible function of an element in the oculomotor pathways based on physiological and anatomical pieces of evidence. In this model, two internal feedback loops compe…

genetic structuresGeneral Computer ScienceComputer sciencebusiness.industrySuperior colliculusGeneral EngineeringBiomechanicsEye movementRoboticsSmooth pursuitSaccadic maskingNonlinear systemCerebellar vermisGeneral Materials ScienceArtificial intelligencebusinessNeuroscienceIEEE Access
researchProduct

An Efficient Implementation of Parallel Parametric HRTF Models for Binaural Sound Synthesis in Mobile Multimedia

2020

The extended use of mobile multimedia devices in applications like gaming, 3D video and audio reproduction, immersive teleconferencing, or virtual and augmented reality, is demanding efficient algorithms and methodologies. All these applications require real-time spatial audio engines with the capability of dealing with intensive signal processing operations while facing a number of constraints related to computational cost, latency and energy consumption. Most mobile multimedia devices include a Graphics Processing Unit (GPU) that is primarily used to accelerate video processing tasks, providing high computational capabilities due to its inherent parallel architecture. This paper describes…

interpolation.General Computer Scienceparallel filtersComputer scienceGPUGpuGraphics processing unitLatency (audio)Parametric model02 engineering and technologycomputer.software_genre030507 speech-language pathology & audiology03 medical and health sciencesSoftware portabilityHRTF modeling0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceMultimediaparametric modelGeneral EngineeringTeleconferenceBinaural synthesis020206 networking & telecommunicationsVideo processingEnergy consumptioninterpolationInterpolationHrtf modelingScalabilityParallel filtersElectrónicaAugmented realitylcsh:Electrical engineering. Electronics. Nuclear engineering0305 other medical sciencelcsh:TK1-9971Mobile devicecomputerIEEE Access
researchProduct

Pressure-Induced Deformation of Pillar-Type Profiled Membranes and Its Effects on Flow and Mass Transfer

2019

In electro-membrane processes, a pressure difference may arise between solutions flowing in alternate channels. This transmembrane pressure (TMP) causes a deformation of the membranes and of the fluid compartments. This, in turn, affects pressure losses and mass transfer rates with respect to undeformed conditions and may result in uneven flow rate and mass flux distributions. These phenomena were analyzed here for round pillar-type profiled membranes by integrated mechanical and fluid dynamics simulations. The analysis involved three steps: (1) A conservatively large value of TMP was imposed, and mechanical simulations were performed to identify the geometry with the minimum pillar density…

ion exchange membraneMass fluxSettore ING-IND/26 - Teoria Dello Sviluppo Dei Processi ChimiciMaterials scienceGeneral Computer Sciencereverse electrodialysisFlow (psychology)fluid-structure interaction02 engineering and technologyDeformation (meteorology)Computational fluid dynamicsElectrodialysilcsh:QA75.5-76.95Theoretical Computer Sciencestructural mechanics020401 chemical engineeringMass transferReverse electrodialysimass transferFluid dynamicselectrodialysis0204 chemical engineeringSettore ING-IND/19 - Impianti Nuclearipressure dropprofiled membranebusiness.industryApplied MathematicsMechanics021001 nanoscience & nanotechnologyVolumetric flow rateMembraneModeling and Simulationlcsh:Electronic computers. Computer scienceSettore ICAR/08 - Scienza Delle CostruzioniCFD0210 nano-technologybusinessComputation
researchProduct

On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples

2022

The use of artificial intelligence and machine learning is recognized as the key enabler for 5G mobile networks which would allow service providers to tackle the network complexity and ensure security, reliability and allocation of the necessary resources to their customers in a dynamic, robust and trustworthy way. Dependability of the future generation networks on accurate and timely performance of its artificial intelligence components means that disturbance in the functionality of these components may have negative impact on the entire network. As a result, there is an increasing concern about the vulnerability of intelligent machine learning driven frameworks to adversarial effects. In …

koneoppiminenGeneral Computer ScienceGeneral Engineeringdeep learningsyväoppiminenGeneral Materials Science5G-tekniikkaElectrical and Electronic Engineeringtekoälyartificial intelligenceadversarial machine learning5G networks
researchProduct

A Conceptual Framework for Using and Evaluating Web-Based Learning Resources in School Education

2010

Published version of an article from the journal:Journal of Information Technology Education. Also available from the publisher: http://www.jite.org/documents/Vol9/JITEv9p053-079Hadjerrouit743.pdf Web-based learning resources (WBLRs) have provided teachers with a wide range of new teachingexperiences that are not possible in traditional classroom. However, little research has beendone as to which approach to WBLRs is suitable to address issues that are pertinent to learning.This paper proposes a conceptual framework to explore the design and evaluation of WBLRs inschool education. The paper also examines the way in which the framework is used to evaluatestudents? and teachers? perceptions o…

lcsh:LC8-6691Knowledge managementlcsh:Special aspects of educationlcsh:T58.5-58.64General Computer Sciencelcsh:Information technologybusiness.industryComputer scienceVDP::Technology: 500::Information and communication technology: 550Information technology educationEducationWorld Wide WebConceptual frameworkWeb based learningEducational resourcesEvaluation methodsComputingMethodologies_DOCUMENTANDTEXTPROCESSINGElectronic publishingThe InternetVDP::Social science: 200::Education: 280businessGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)School educationJournal of Information Technology Education: Research
researchProduct

The Internet of Things for Applications in Wearable Technology

2022

The advent of the Internet of Things (IoT) era has propelled the development of wearable technology. Wearable devices are widely used in medical, healthcare, sports, and safety applications, bringing more convenience to the living environment. Wearable devices can be worn on the body, collect body data using sensors, and process the collected data to obtain valuable information. IoT enables devices to connect and exchange and transmit data. Wearable devices in IoT can collect data for analysis and automatically adjust wearable device functions by connecting the obtained information to other devices. In this paper, we collect and organize articles on wearable devices used in IoT from 2017 to…

liikuntateknologialääketieteellinen tekniikkaGeneral Computer SciencehyvinvointiteknologiaInternet of ThingsGeneral Engineeringkoneoppiminenmachine learning wearable technologyälytekniikkaGeneral Materials Scienceesineiden internetpuettava teknologiaElectrical and Electronic Engineeringanturit
researchProduct

On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication

2022

Apache Log4j2 is a prevalent logging library for Java-based applications. In December 2021, several critical and high-impact software vulnerabilities, including CVE-2021-44228, were publicly disclosed, enabling remote code execution (RCE) and denial of service (DoS) attacks. To date, these vulnerabilities are considered critical and the consequences of their disclosure far-reaching. The vulnerabilities potentially affect a wide range of internet of things (IoT) devices, embedded devices, critical infrastructure (CI), and cyber-physical systems (CPSs). In this paper, we study the effects and feasibility of exploiting these vulnerabilities in mission-critical aviation and maritime environment…

log4shellCVE-2021-44228General Computer Sciencelog4jvulnerabilitysatelliteavionicsexperimentationlangaton tiedonsiirtoproof-of-conceptACARSGeneral Materials ScienceElectrical and Electronic EngineeringkyberturvallisuushaavoittuvuusAIStietoliikennesatelliititlentoliikenneGeneral EngineeringaerospaceApachemeriliikennemaritimeaviationlangaton viestintäverkkohyökkäyksetlennonvarmistusexploitationADS-BJavaIEEE Access
researchProduct