Search results for "Software"

showing 10 items of 7396 documents

Análise técnico-tático no Taekwondo com coordenadas polares através de software HOISAN

2015

Se lleva a cabo un análisis de coordenadas polares en Taekwondo de las acciones realizadas por los hombres finalistas y semifinalistas en los Juegos Olímpicos de Londres 2012. Para este análisis, se consideraron como categorías focales las acciones relativas a la efectividad de uno, dos y tres puntos, y como categorías condicionadas variables técnico-tácticas para establecer las diferentes relaciones entre las diversas categorías relacionadas con el comportamiento técnico-táctico de los deportistas y la consecución de punto/s. Los resultados mostraron una relación, de excitación en las perspectivas retrospectiva y prospectiva, entre las conductas CAN (Acción de contraataque), CIR (Pierna de…

coordenadas polaresInteractionTaekwondo79 - Diversiones. Espectáculos. Cine. Teatro. Danza. Juegos.DeportesInteracciónEducació físicaobservacióndeporte de combatePolar coordinatesEducació InvestigacióInteraçãosoftware HOISAN
researchProduct

Análisis técnico-táctico en Taekwondo con coordenadas polares a través del software HOISAN

2015

Se lleva a cabo un análisis de coordenadas polares en Taekwondo de las acciones realizadas por los hombres finalistas y semifinalistas en los Juegos Olímpicos de Londres 2012. Para este análisis, se consideraron como categorías focales las acciones relativas a la efectividad de uno, dos y tres puntos, y como categorías condicionadas variables técnico-tácticas para establecer las diferentes relaciones entre las diversas categorías relacionadas con el comportamiento técnico-táctico de los deportistas y la consecución de punto/s. Los resultados mostraron una relación, de excitación en las perspectivas retrospectiva y prospectiva, entre las conductas CAN (Acción de contraataque), CIR (Pierna de…

coordenadas polaresobservationInteractionInteraccióndesportos de combateobservaciónpolar coordinatescombatsportdeporte de combateobservaçãosoftware HOISANInteração
researchProduct

Market Entry and Priority of Small and Medium-Sized Enterprises in the Software Industry: An Empirical Analysis of Cultural Distance, Geographical Di…

2007

This paper investigates the influence of cultural distance, geographical distance, and three market size variables to the target country preference of SMEs in the software industry. In addition, we examine the shift of priorities in SMEs’ country selection by analyzing how these factors impact the selection of the first, second, and third target countries. Empirical findings of this study suggest that almost 70% of country choices can be explained by software market size and geographical distance alone. The findings adduced also that entry priority of SMEs shifts very fast from countries within a short geographical distance to countries with high purchasing power and within a greater geogra…

country selectionsoftware firmsMarket entrySMEsinternationalization
researchProduct

Teaching master's degree students to read research literature

2017

The skill to read research literature critically belongs in every university graduate’s toolbox. I have attempted to teach this skill in a master’s degree level course in programming languages over 15 years using, at various times, simulated conferences, voluntary reading exercises, evidence-based practice training, and a flipped classroom with mandatory reading assignments. I discuss my experience and analyze preliminary qualitative data on the use of evidence-based practice and a flipped classroom for this purpose. I present no firm conclusions, but expect that future work (by me or others) will be able to use my experience as a baseline for better teaching of research literature reading.…

critical readingEvidence-based practiceComputer sciencemedia_common.quotation_subjectevidence-based practicescience literacy02 engineering and technologycomputer.software_genreFlipped classroomlukeminenReading (process)ComputingMilieux_COMPUTERSANDEDUCATION0202 electrical engineering electronic engineering information engineeringta516critical thinkingmedia_commonta113Programming language05 social scienceskriittisyys050301 education020207 software engineeringnäyttöön perustuvat käytännötkäänteinen opetusToolboxkriittinen ajattelutieteellinen ajattelusisällönanalyysievidencebased programming language designCritical thinkingContent analysisCritical readingpyramid discussionkvalitatiivinen tutkimus0503 educationcomputerQualitative researchProceedings of the 17th Koli Calling International Conference on Computing Education Research
researchProduct

Crystal structure of (E)-pent-2-enoic acid

2015

The molecule of the title compound, C5H8O2, a low-melting α,β-unsaturated carboxylic acid, is essentially planar [maximum displacement = 0.0239 (13) Å]. In the crystal, molecules are linked into centrosymmetric dimersviapairs of O—H...O hydrogen bonds.

crystal structurehydrogen bondunsaturated carb­oxy­lic acidHydrogen bondDimerGeneral ChemistryCrystal structureCondensed Matter Physicscomputer.software_genredimerData ReportsCrystallcsh:ChemistryCrystallographychemistry.chemical_compoundPlanarchemistrylcsh:QD1-999General Materials ScienceData miningMaximum displacementcomputerunsaturated carboxylic acidActa Crystallographica Section E: Crystallographic Communications
researchProduct

Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems

2021

Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…

cybersecurityIndustry 4.0Computer scienceVulnerabilityneuroverkot02 engineering and technologytekoälyComputer securitycomputer.software_genreAdversarial systemImmunityTaxonomy (general)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceFlexibility (engineering)Generative Adversarial Networksbusiness.industryMechanism (biology)020206 networking & telecommunicationsIndustry 4.0AutomationVariety (cybernetics)koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingbusinesscomputerProcedia Computer Science
researchProduct

Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime

2020

The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…

cybersecurityfrustration050801 communication & media studies02 engineering and technologyprivacy concernsComputer securitycomputer.software_genre0508 media and communications020204 information systemsyksityisyys0202 electrical engineering electronic engineering information engineeringkyberturvallisuusonline expressionriskitverkkopalvelutInternetkyberrikollisuustime consumption05 social sciencesitseilmaisukuluttajakäyttäytyminenCybercrimerisk avoidanceExpression (architecture)cybercrimePsychologycomputerpersonal cybersecurity spending
researchProduct

Track finding at Belle II

2021

Computer physics communications 259, 107610 (2021). doi:10.1016/j.cpc.2020.107610

data analysis methodPhysics - Instrumentation and DetectorsComputer scienceReal-time computingFOS: Physical sciencesGeneral Physics and AstronomyBELLETrack (rail transport)01 natural sciences530programming010305 fluids & plasmasHigh Energy Physics - ExperimentTracking algorithmsHigh Energy Physics - Experiment (hep-ex)Tracking detectorsSoftware0103 physical sciences[PHYS.HEXP]Physics [physics]/High Energy Physics - Experiment [hep-ex]Belle II; Tracking algorithms; Tracking detectorsBelle IIddc:530[PHYS.PHYS.PHYS-INS-DET]Physics [physics]/Physics [physics]/Instrumentation and Detectors [physics.ins-det]010306 general physicsSpurious relationshipSelection (genetic algorithm)Event reconstructionbusiness.industrytrack data analysisInstrumentation and Detectors (physics.ins-det)Modular designResolution (logic)charged particleHardware and Architecturebusinessperformance
researchProduct

Col : A Data Collection Protocol for Vanet

2012

International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…

data collection protocolVehicular communication systemsVANETCorrectnessnetwork operator antComputer sciencedata acquisitionDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]self-stabilization area02 engineering and technologyVehicle dynamics[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Transient analysis[SPI]Engineering Sciences [physics]0203 mechanical engineeringvehicular ad hoc networkvehicle to vehicle communication0202 electrical engineering electronic engineering information engineeringAlgorithm design and analysisHeuristic algorithmsCOL algorithmProtocol (object-oriented programming)ComputingMilieux_MISCELLANEOUSAirplug software distributionVehicular ad hoc networkData collectionbusiness.industryNetwork partitionnetwork partition020206 networking & telecommunications020302 automobile design & engineeringVehiclesSoftware distributionRoadsAlgorithm designvehicular ad hoc networksbusinessProtocolsComputer network
researchProduct

Towards multi-concern software development with Everything-as-Code

2022

As software is becoming a central element in our lives, more and more stakeholders have concerns. Unlike today, when developers stop their coding activities to satisfy these stakeholder concerns, we propose dealing with them as part of the coding workflow, the central element of programmers’ daily duties. This can be achieved by extending the approach that we call Everything-as-Code (EaC) beyond software engineers and operators. peerReviewed

data modelssoftwareohjelmoijatohjelmistotuotantotask analysiscodessidosryhmätohjelmistokehitysdocumentationstakeholderspipelines
researchProduct