Search results for "Software"
showing 10 items of 7396 documents
Análise técnico-tático no Taekwondo com coordenadas polares através de software HOISAN
2015
Se lleva a cabo un análisis de coordenadas polares en Taekwondo de las acciones realizadas por los hombres finalistas y semifinalistas en los Juegos Olímpicos de Londres 2012. Para este análisis, se consideraron como categorías focales las acciones relativas a la efectividad de uno, dos y tres puntos, y como categorías condicionadas variables técnico-tácticas para establecer las diferentes relaciones entre las diversas categorías relacionadas con el comportamiento técnico-táctico de los deportistas y la consecución de punto/s. Los resultados mostraron una relación, de excitación en las perspectivas retrospectiva y prospectiva, entre las conductas CAN (Acción de contraataque), CIR (Pierna de…
Análisis técnico-táctico en Taekwondo con coordenadas polares a través del software HOISAN
2015
Se lleva a cabo un análisis de coordenadas polares en Taekwondo de las acciones realizadas por los hombres finalistas y semifinalistas en los Juegos Olímpicos de Londres 2012. Para este análisis, se consideraron como categorías focales las acciones relativas a la efectividad de uno, dos y tres puntos, y como categorías condicionadas variables técnico-tácticas para establecer las diferentes relaciones entre las diversas categorías relacionadas con el comportamiento técnico-táctico de los deportistas y la consecución de punto/s. Los resultados mostraron una relación, de excitación en las perspectivas retrospectiva y prospectiva, entre las conductas CAN (Acción de contraataque), CIR (Pierna de…
Market Entry and Priority of Small and Medium-Sized Enterprises in the Software Industry: An Empirical Analysis of Cultural Distance, Geographical Di…
2007
This paper investigates the influence of cultural distance, geographical distance, and three market size variables to the target country preference of SMEs in the software industry. In addition, we examine the shift of priorities in SMEs’ country selection by analyzing how these factors impact the selection of the first, second, and third target countries. Empirical findings of this study suggest that almost 70% of country choices can be explained by software market size and geographical distance alone. The findings adduced also that entry priority of SMEs shifts very fast from countries within a short geographical distance to countries with high purchasing power and within a greater geogra…
Teaching master's degree students to read research literature
2017
The skill to read research literature critically belongs in every university graduate’s toolbox. I have attempted to teach this skill in a master’s degree level course in programming languages over 15 years using, at various times, simulated conferences, voluntary reading exercises, evidence-based practice training, and a flipped classroom with mandatory reading assignments. I discuss my experience and analyze preliminary qualitative data on the use of evidence-based practice and a flipped classroom for this purpose. I present no firm conclusions, but expect that future work (by me or others) will be able to use my experience as a baseline for better teaching of research literature reading.…
Crystal structure of (E)-pent-2-enoic acid
2015
The molecule of the title compound, C5H8O2, a low-melting α,β-unsaturated carboxylic acid, is essentially planar [maximum displacement = 0.0239 (13) Å]. In the crystal, molecules are linked into centrosymmetric dimersviapairs of O—H...O hydrogen bonds.
Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems
2021
Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…
Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime
2020
The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…
Track finding at Belle II
2021
Computer physics communications 259, 107610 (2021). doi:10.1016/j.cpc.2020.107610
Col : A Data Collection Protocol for Vanet
2012
International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…
Towards multi-concern software development with Everything-as-Code
2022
As software is becoming a central element in our lives, more and more stakeholders have concerns. Unlike today, when developers stop their coding activities to satisfy these stakeholder concerns, we propose dealing with them as part of the coding workflow, the central element of programmers’ daily duties. This can be achieved by extending the approach that we call Everything-as-Code (EaC) beyond software engineers and operators. peerReviewed