Search results for "General Computer Science"
showing 10 items of 895 documents
Towards Ethical Guidelines of Using Telepresence Robots in Residential Care
2021
AbstractRobotic telepresence is a potential technology to help alleviating the loneliness of elderly people. The impacts of long-term use of telepresence robots in residential care are not well known. We were interested in how using a telepresence robot influences the resident, family members and care workers at a facility, and what challenges and solutions there are for wider adoption of such robots in residential care. With a telepresence robot Double, we arranged a series of three trials in two separate residential care facilities: one 12-week trial in a private facility and two successive 6-week trials in a public facility. In each trial, we installed the telepresence robot in a room of…
The Influence of Student Abilities and High School on Student Growth: A Case Study of Chinese National College Entrance Exam
2019
Enabled by available educational data and data mining techniques, educational data analysis has become a hot topic. Current researches mainly focus on the prediction of problems and performance rather than revealing the underlying causal relationships. Based on a unique exam data, we extracted the abilities of examinee from HSEE (High School Entrance Exam) based on the knowledge of educational experts, then we measured student growth from middle school to high school in total score and subject scores. We studied the impact of high school ranking and student abilities of HSEE on student growth by multiple linear regression model, in which high school ranking is divided into 5 levels, Level 1…
A non-cooperative approach to the folk rule in minimum cost spanning tree problems
2023
This paper deals with the problem of finding a way to distribute the cost of a minimum cost spanning tree problem between the players. A rule that assigns a payoff to each player provides this distribution. An optimistic point of view is considered to devise a cooperative game. Following this optimistic approach, a sequential game provides this construction to define the action sets of the players. The main result states the existence of a unique cost allocation in subgame perfect equilibria. This cost allocation matches the one suggested by the folk rule. The authors thank the support of the Spanish Ministry of Science, Innovation and Universities, the Spanish Ministry of Economy and Compe…
2020
In this paper a comprehensive system-level computational model of oculomotor pathways is presented. This model shows the necessity of embedding internal models of muscles biomechanics in the cerebellar Vermis to realize fast saccadic eye movements based on predicting the changes in muscles lengths. First, the eye biomechanics are described by nonlinear equations during “slow” and “fast” movements. Afterward, by analyzing these equations, a computational model, is deduced. Furthermore, each part of this model is interpreted as a possible function of an element in the oculomotor pathways based on physiological and anatomical pieces of evidence. In this model, two internal feedback loops compe…
An Efficient Implementation of Parallel Parametric HRTF Models for Binaural Sound Synthesis in Mobile Multimedia
2020
The extended use of mobile multimedia devices in applications like gaming, 3D video and audio reproduction, immersive teleconferencing, or virtual and augmented reality, is demanding efficient algorithms and methodologies. All these applications require real-time spatial audio engines with the capability of dealing with intensive signal processing operations while facing a number of constraints related to computational cost, latency and energy consumption. Most mobile multimedia devices include a Graphics Processing Unit (GPU) that is primarily used to accelerate video processing tasks, providing high computational capabilities due to its inherent parallel architecture. This paper describes…
Pressure-Induced Deformation of Pillar-Type Profiled Membranes and Its Effects on Flow and Mass Transfer
2019
In electro-membrane processes, a pressure difference may arise between solutions flowing in alternate channels. This transmembrane pressure (TMP) causes a deformation of the membranes and of the fluid compartments. This, in turn, affects pressure losses and mass transfer rates with respect to undeformed conditions and may result in uneven flow rate and mass flux distributions. These phenomena were analyzed here for round pillar-type profiled membranes by integrated mechanical and fluid dynamics simulations. The analysis involved three steps: (1) A conservatively large value of TMP was imposed, and mechanical simulations were performed to identify the geometry with the minimum pillar density…
On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples
2022
The use of artificial intelligence and machine learning is recognized as the key enabler for 5G mobile networks which would allow service providers to tackle the network complexity and ensure security, reliability and allocation of the necessary resources to their customers in a dynamic, robust and trustworthy way. Dependability of the future generation networks on accurate and timely performance of its artificial intelligence components means that disturbance in the functionality of these components may have negative impact on the entire network. As a result, there is an increasing concern about the vulnerability of intelligent machine learning driven frameworks to adversarial effects. In …
A Conceptual Framework for Using and Evaluating Web-Based Learning Resources in School Education
2010
Published version of an article from the journal:Journal of Information Technology Education. Also available from the publisher: http://www.jite.org/documents/Vol9/JITEv9p053-079Hadjerrouit743.pdf Web-based learning resources (WBLRs) have provided teachers with a wide range of new teachingexperiences that are not possible in traditional classroom. However, little research has beendone as to which approach to WBLRs is suitable to address issues that are pertinent to learning.This paper proposes a conceptual framework to explore the design and evaluation of WBLRs inschool education. The paper also examines the way in which the framework is used to evaluatestudents? and teachers? perceptions o…
The Internet of Things for Applications in Wearable Technology
2022
The advent of the Internet of Things (IoT) era has propelled the development of wearable technology. Wearable devices are widely used in medical, healthcare, sports, and safety applications, bringing more convenience to the living environment. Wearable devices can be worn on the body, collect body data using sensors, and process the collected data to obtain valuable information. IoT enables devices to connect and exchange and transmit data. Wearable devices in IoT can collect data for analysis and automatically adjust wearable device functions by connecting the obtained information to other devices. In this paper, we collect and organize articles on wearable devices used in IoT from 2017 to…
On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication
2022
Apache Log4j2 is a prevalent logging library for Java-based applications. In December 2021, several critical and high-impact software vulnerabilities, including CVE-2021-44228, were publicly disclosed, enabling remote code execution (RCE) and denial of service (DoS) attacks. To date, these vulnerabilities are considered critical and the consequences of their disclosure far-reaching. The vulnerabilities potentially affect a wide range of internet of things (IoT) devices, embedded devices, critical infrastructure (CI), and cyber-physical systems (CPSs). In this paper, we study the effects and feasibility of exploiting these vulnerabilities in mission-critical aviation and maritime environment…