Search results for "VDP::Technology: 500"

showing 10 items of 538 documents

Didactics of ICT in Secondary Education: Conceptual Issues and Practical Perspectives

2009

Article published in the journal: Issues in Informing Science and Information Technology. Also available from the publisher: http://iisit.org/Vol6/IISITv6p153-178Hadjerrouit605.pdf While there is a huge research literature on the field of ICT (Information and Communication Technology) as a tool in teaching and learning, there is much less research on the area of ICT as a subject or similar designations such as school informatics. As a result, there is a lack of theoretical grounding of the didactics of ICT and associated teaching and learning processes. One of the main reasons for the lack of theoretical underpinnings of the didactics of ICT is that there have been in the past and there per…

Secondary educationlcsh:T58.5-58.64business.industryComputer sciencelcsh:Information technologyInformation technologyVDP::Technology: 500::Information and communication technology: 550Information and Communications TechnologyPedagogyComputingMilieux_COMPUTERSANDEDUCATIONbusinessGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)Informing scienceVDP::Social science: 200::Education: 280::Subject didactics: 283Issues in Informing Science and Information Technology
researchProduct

PMG-Pro: A Model-Driven Development Method of Service-Based Applications

2011

Published version of a chapter published in the book: SDL 2011: Integrating System and Software Modeling. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-25264-8_12 In the Internet of Things, billions of networked and software-driven devices will be connected to the Internet. They can communicate and cooperate with each other to form a composite system. In this paper, we propose PMG-pro (present, model, generate and provide), a language independent, bottom-up and model-driven method for the development of such composite system. We envision that all devices in the Internet of Things provide their functionalities as services. From a service description, a service pre…

Service (business)InternetSource codebusiness.industryComputer scienceService delivery frameworkService designmedia_common.quotation_subjectVDP::Technology: 500::Information and communication technology: 550Activity diagramWorld Wide WebCustomer Service AssuranceThe InternetCode generationbusinessSoftware engineeringmedia_common
researchProduct

Media Delivery to Remote Renderers Controlled by the Mobile Phone

2009

In today's content delivery solutions, service delivery and control are still tightly coupled, a service typically being delivered to the same device that controls the session. We present a solution that was designed with the goal to decouple service control and delivery. Using our approach, multimedia streaming services can be delivered to off-the-shelf DLNA devices in visited networks. The service provider receives information about the remote media player and access environment via a mobile phone. Proximity technologies (e.g. barcodes, NFC) of the control device are used for the exchange of required credentials. This paper describes a typical scenario and our prototype implementation.

Service (business)MultimediaComputer sciencebusiness.industryService delivery frameworkMobile computingService providercomputer.software_genreMobile phoneNext-generation networkVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552The InternetSession (computer science)Best-effort deliverybusinesscomputerComputer network
researchProduct

Discovering web services in social web service repositories using deep variational autoencoders

2020

Abstract Web Service registries have progressively evolved to social networks-like software repositories. Users cooperate to produce an ever-growing, rich source of Web APIs upon which new value-added Web applications can be built. Such users often interact in order to follow, comment on, consume and compose services published by other users. In this context, Web Service discovery is a core functionality of modern registries as needed Web Services must be discovered before being consumed or composed. Many efforts to provide effective keyword-based service discovery mechanisms are based on Information Retrieval techniques as services are described using structured or unstructured textdocumen…

Service (systems architecture)Information retrievalbusiness.industryComputer scienceService discovery02 engineering and technologyLibrary and Information SciencesManagement Science and Operations Researchcomputer.software_genreSocial webWeb APIAutoencoderComputer Science Applications020204 information systemsVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 5520202 electrical engineering electronic engineering information engineeringMedia TechnologyWeb application020201 artificial intelligence & image processingWeb servicebusinessFeature learningcomputerInformation Systems
researchProduct

SIGNAL ANALYSIS AND PERFORMANCE EVALUATION OF A VEHICLE CRASH TEST WITH A FIXED SAFETY BARRIER BASED ON HAAR WAVELETS

2011

Author's version of an article published in the journal: International Journal of Wavelets, Multiresolution and Information Processing. Also available from the publisher at: http://dx.doi.org/10.1142/s0219691311003979 This paper deals with the wavelet-based performance analysis of the safety barrier for use in a full-scale test. The test involves a vehicle, a Ford Fiesta, which strikes the safety barrier at a prescribed angle and speed. The vehicle speed before the collision was measured. Vehicle accelerations in three directions at the center of gravity were measured during the collision. The yaw rate was measured with a gyro meter. Using normal speed and high-speed video cameras, the beha…

Signal processingComputer scienceApplied MathematicsInformation processingHaarSafety barrierCollisioncomputer.software_genreVDP::Mathematics and natural science: 400::Mathematics: 410Test (assessment)WaveletAcceptance testingSignal Processingacceptance criteria collision safety barrier traffic safety wavelet safety barriersData miningVDP::Technology: 500::Materials science and engineering: 520computerSimulationInformation SystemsInternational Journal of Wavelets, Multiresolution and Information Processing
researchProduct

A Review on Approaches for Condition Based Maintenance in Applications with Induction Machines located Offshore

2012

Published version of an article in the journal: Modeling, Identification and Control. Also available from the publisher at: http://dx.doi.org/10.4173/mic.2012.2.4 Open access This paper presents a review of different approaches for Condition Based Maintenance (CBM) of induction machines and drive trains in offshore applications. The paper contains an overview of common failure modes, monitoring techniques, approaches for diagnostics, and an overview of typical maintenance actions. Although many papers have been written in this area before, this paper puts an emphasis on recent developments and limits the scope to induction machines and drive trains applied in applications located offshore.

Signal processingEngineeringGearboxDrivetrainlcsh:QA75.5-76.95wind turbineInduction machineDiagnosticsPrognosticsbusiness.industryCondition-based maintenanceVDP::Technology: 500Electrical engineeringCondition monitoringComputer Science ApplicationsCondition monitoringIdentification (information)Induction machineControl and Systems EngineeringModeling and SimulationBearingPrognosticslcsh:Electronic computers. Computer scienceSoftware engineeringbusinessSoftwareModeling, Identification and Control
researchProduct

Anam-Net: Anamorphic Depth Embedding-Based Lightweight CNN for Segmentation of Anomalies in COVID-19 Chest CT Images.

2021

Chest computed tomography (CT) imaging has become indispensable for staging and managing coronavirus disease 2019 (COVID-19), and current evaluation of anomalies/abnormalities associated with COVID-19 has been performed majorly by the visual score. The development of automated methods for quantifying COVID-19 abnormalities in these CT images is invaluable to clinicians. The hallmark of COVID-19 in chest CT images is the presence of ground-glass opacities in the lung region, which are tedious to segment manually. We propose anamorphic depth embedding-based lightweight CNN, called Anam-Net, to segment anomalies in COVID-19 chest CT images. The proposed Anam-Net has 7.8 times fewer parameters …

Similarity (geometry)Coronavirus disease 2019 (COVID-19)Computer Networks and CommunicationsComputer scienceComputed tomography02 engineering and technologyDeep LearningArtificial Intelligence0202 electrical engineering electronic engineering information engineeringMedical imagingmedicineImage Processing Computer-AssistedHumansSegmentationComputer visionLung regionLungmedicine.diagnostic_testbusiness.industryDeep learningVDP::Technology: 500COVID-19Image segmentationComputer Science ApplicationsEmbedding020201 artificial intelligence & image processingArtificial intelligenceNeural Networks ComputerbusinessTomography X-Ray ComputedSoftwareIEEE transactions on neural networks and learning systems
researchProduct

A mutual GrabCut method to solve co-segmentation

2013

Publised version of an article from the journal:Eurasip Journal on Image and Video Processing. Also available on SpringerLink:http://dx.doi.org/10.1186/1687-5281-2013-20. Open Access Co-segmentation aims at segmenting common objects from a group of images. Markov random field (MRF) has been widely used to solve co-segmentation, which introduces a global constraint to make the foreground similar to each other. However, it is difficult to minimize the new model. In this paper, we propose a new Markov random field-based co-segmentation model to solve co-segmentation problem without minimization problem. In our model, foreground similarity constraint is added into the unary term of MRF model ra…

Similarity (geometry)Markov random fieldComputer sciencebusiness.industryVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONVDP::Technology: 500::Information and communication technology: 550Pattern recognitionFunction (mathematics)Term (time)Constraint (information theory)GrabCutComputer Science::Computer Vision and Pattern RecognitionCutSignal ProcessingSegmentationArtificial intelligenceElectrical and Electronic EngineeringbusinessInformation SystemsEURASIP Journal on Image and Video Processing
researchProduct

Mobile Security with Location-Aware Role-Based Access Control

2012

Published version of an article from the book: Security and privacy in mobile information and communication systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-30244-2_15 This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static and dynamic) can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC c…

Software_OPERATINGSYSTEMSMarkup languagebusiness.industryComputer scienceSeparation of dutiesXACMLComputerApplications_COMPUTERSINOTHERSYSTEMSAccess controlComputer securitycomputer.software_genreFirewall (construction)Software deploymentVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Role-based access controlbusinesscomputerMobile deviceComputer networkcomputer.programming_language
researchProduct

The impact of spatial correlation on the statistical properties of the capacity of nakagami-m channels with MRC and EGC

2011

Published version of an article published in the journal: EURASIP Journal on Wireless Communications and Networking. Also available from the publisher at: http://dx.doi.org/10.1186/1687-1499-2011-116. OA In this article, we have studied the statistical properties of the instantaneous channel capacitya of spatially correlated Nakagami-m channels for two different diversity combining methods, namely maximal ratio combining (MRC) and equal gain combining (EGC). Specifically, using the statistical properties of the instantaneous signal-to-noise ratio, we have derived the analytical expressions for the probability density function (PDF), cumulative distribution function (CDF), level-crossing rat…

Spatial correlationComputer sciencebusiness.industryComputer Networks and CommunicationsCumulative distribution functionTransmitterNakagami distributionAntenna diversityComputer Science ApplicationsChannel capacityDiversity combiningModulationStatisticsVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Signal ProcessingMaximal-ratio combiningTelecommunicationsbusinessCommunication channelComputer Science::Information TheoryEURASIP Journal on Wireless Communications and Networking
researchProduct