Search results for "VDP::Technology: 500"
showing 10 items of 538 documents
Didactics of ICT in Secondary Education: Conceptual Issues and Practical Perspectives
2009
Article published in the journal: Issues in Informing Science and Information Technology. Also available from the publisher: http://iisit.org/Vol6/IISITv6p153-178Hadjerrouit605.pdf While there is a huge research literature on the field of ICT (Information and Communication Technology) as a tool in teaching and learning, there is much less research on the area of ICT as a subject or similar designations such as school informatics. As a result, there is a lack of theoretical grounding of the didactics of ICT and associated teaching and learning processes. One of the main reasons for the lack of theoretical underpinnings of the didactics of ICT is that there have been in the past and there per…
PMG-Pro: A Model-Driven Development Method of Service-Based Applications
2011
Published version of a chapter published in the book: SDL 2011: Integrating System and Software Modeling. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-25264-8_12 In the Internet of Things, billions of networked and software-driven devices will be connected to the Internet. They can communicate and cooperate with each other to form a composite system. In this paper, we propose PMG-pro (present, model, generate and provide), a language independent, bottom-up and model-driven method for the development of such composite system. We envision that all devices in the Internet of Things provide their functionalities as services. From a service description, a service pre…
Media Delivery to Remote Renderers Controlled by the Mobile Phone
2009
In today's content delivery solutions, service delivery and control are still tightly coupled, a service typically being delivered to the same device that controls the session. We present a solution that was designed with the goal to decouple service control and delivery. Using our approach, multimedia streaming services can be delivered to off-the-shelf DLNA devices in visited networks. The service provider receives information about the remote media player and access environment via a mobile phone. Proximity technologies (e.g. barcodes, NFC) of the control device are used for the exchange of required credentials. This paper describes a typical scenario and our prototype implementation.
Discovering web services in social web service repositories using deep variational autoencoders
2020
Abstract Web Service registries have progressively evolved to social networks-like software repositories. Users cooperate to produce an ever-growing, rich source of Web APIs upon which new value-added Web applications can be built. Such users often interact in order to follow, comment on, consume and compose services published by other users. In this context, Web Service discovery is a core functionality of modern registries as needed Web Services must be discovered before being consumed or composed. Many efforts to provide effective keyword-based service discovery mechanisms are based on Information Retrieval techniques as services are described using structured or unstructured textdocumen…
SIGNAL ANALYSIS AND PERFORMANCE EVALUATION OF A VEHICLE CRASH TEST WITH A FIXED SAFETY BARRIER BASED ON HAAR WAVELETS
2011
Author's version of an article published in the journal: International Journal of Wavelets, Multiresolution and Information Processing. Also available from the publisher at: http://dx.doi.org/10.1142/s0219691311003979 This paper deals with the wavelet-based performance analysis of the safety barrier for use in a full-scale test. The test involves a vehicle, a Ford Fiesta, which strikes the safety barrier at a prescribed angle and speed. The vehicle speed before the collision was measured. Vehicle accelerations in three directions at the center of gravity were measured during the collision. The yaw rate was measured with a gyro meter. Using normal speed and high-speed video cameras, the beha…
A Review on Approaches for Condition Based Maintenance in Applications with Induction Machines located Offshore
2012
Published version of an article in the journal: Modeling, Identification and Control. Also available from the publisher at: http://dx.doi.org/10.4173/mic.2012.2.4 Open access This paper presents a review of different approaches for Condition Based Maintenance (CBM) of induction machines and drive trains in offshore applications. The paper contains an overview of common failure modes, monitoring techniques, approaches for diagnostics, and an overview of typical maintenance actions. Although many papers have been written in this area before, this paper puts an emphasis on recent developments and limits the scope to induction machines and drive trains applied in applications located offshore.
Anam-Net: Anamorphic Depth Embedding-Based Lightweight CNN for Segmentation of Anomalies in COVID-19 Chest CT Images.
2021
Chest computed tomography (CT) imaging has become indispensable for staging and managing coronavirus disease 2019 (COVID-19), and current evaluation of anomalies/abnormalities associated with COVID-19 has been performed majorly by the visual score. The development of automated methods for quantifying COVID-19 abnormalities in these CT images is invaluable to clinicians. The hallmark of COVID-19 in chest CT images is the presence of ground-glass opacities in the lung region, which are tedious to segment manually. We propose anamorphic depth embedding-based lightweight CNN, called Anam-Net, to segment anomalies in COVID-19 chest CT images. The proposed Anam-Net has 7.8 times fewer parameters …
A mutual GrabCut method to solve co-segmentation
2013
Publised version of an article from the journal:Eurasip Journal on Image and Video Processing. Also available on SpringerLink:http://dx.doi.org/10.1186/1687-5281-2013-20. Open Access Co-segmentation aims at segmenting common objects from a group of images. Markov random field (MRF) has been widely used to solve co-segmentation, which introduces a global constraint to make the foreground similar to each other. However, it is difficult to minimize the new model. In this paper, we propose a new Markov random field-based co-segmentation model to solve co-segmentation problem without minimization problem. In our model, foreground similarity constraint is added into the unary term of MRF model ra…
Mobile Security with Location-Aware Role-Based Access Control
2012
Published version of an article from the book: Security and privacy in mobile information and communication systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-30244-2_15 This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static and dynamic) can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC c…
The impact of spatial correlation on the statistical properties of the capacity of nakagami-m channels with MRC and EGC
2011
Published version of an article published in the journal: EURASIP Journal on Wireless Communications and Networking. Also available from the publisher at: http://dx.doi.org/10.1186/1687-1499-2011-116. OA In this article, we have studied the statistical properties of the instantaneous channel capacitya of spatially correlated Nakagami-m channels for two different diversity combining methods, namely maximal ratio combining (MRC) and equal gain combining (EGC). Specifically, using the statistical properties of the instantaneous signal-to-noise ratio, we have derived the analytical expressions for the probability density function (PDF), cumulative distribution function (CDF), level-crossing rat…